Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.12.31.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57292
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.12.31.159.			IN	A

;; AUTHORITY SECTION:
.			55	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101100 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 11 23:31:35 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 159.31.12.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.31.12.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
34.80.223.251 attackbotsspam
Invalid user bank4065 from 34.80.223.251 port 29662
2020-05-27 07:16:21
179.57.19.101 attackbots
Unauthorized connection attempt from IP address 179.57.19.101 on Port 445(SMB)
2020-05-27 07:37:16
89.219.65.151 attackspam
Icarus honeypot on github
2020-05-27 07:25:36
181.52.172.107 attackbots
Invalid user www from 181.52.172.107 port 54460
2020-05-27 07:36:28
37.152.182.213 attackspambots
bruteforce detected
2020-05-27 07:08:17
183.89.237.234 attackbots
Disconnected \(auth failed, 1 attempts in 14 secs\):
2020-05-27 07:27:49
188.112.7.56 attackspambots
26-5-2020 17:46:59	Unauthorized connection attempt (Brute-Force).
26-5-2020 17:46:59	Connection from IP address: 188.112.7.56 on port: 587


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=188.112.7.56
2020-05-27 07:07:11
82.252.132.44 attack
Automatic report - Banned IP Access
2020-05-27 07:27:11
209.17.96.130 attackspam
Brute force attack stopped by firewall
2020-05-27 07:02:06
94.232.63.128 attack
Invalid user dbi from 94.232.63.128 port 13056
2020-05-27 07:13:49
37.252.188.130 attackbotsspam
May 27 02:26:32 gw1 sshd[31598]: Failed password for root from 37.252.188.130 port 40660 ssh2
...
2020-05-27 07:06:13
213.132.235.33 attack
Unauthorized connection attempt from IP address 213.132.235.33 on Port 445(SMB)
2020-05-27 07:36:10
181.49.254.230 attack
May 26 15:37:31 ws25vmsma01 sshd[81001]: Failed password for root from 181.49.254.230 port 43620 ssh2
...
2020-05-27 07:11:22
186.93.153.37 attack
1590507987 - 05/26/2020 17:46:27 Host: 186.93.153.37/186.93.153.37 Port: 445 TCP Blocked
2020-05-27 07:22:50
184.105.139.82 attackbotsspam
 UDP 184.105.139.82:37165 -> port 123, len 40
2020-05-27 07:02:32

Recently Reported IPs

107.152.223.70 187.72.188.82 190.92.22.214 103.27.227.239
103.27.227.65 103.246.1.61 128.90.141.172 128.90.50.34
122.241.143.104 128.90.79.2 101.33.253.212 128.90.141.166
187.147.236.228 58.181.102.182 45.72.55.150 99.100.78.207
78.188.170.106 114.34.66.190 117.251.85.118 171.116.232.114