Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.13.212.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64763
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.13.212.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101500 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 15 22:09:11 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 8.212.13.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.212.13.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.145.78.66 attackbots
Sep 16 23:44:33 vps691689 sshd[9907]: Failed password for root from 190.145.78.66 port 59480 ssh2
Sep 16 23:49:22 vps691689 sshd[9986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.78.66
...
2019-09-17 06:08:10
27.254.81.81 attackspambots
Sep 16 22:59:57 MK-Soft-Root2 sshd\[2919\]: Invalid user gpadmin from 27.254.81.81 port 43652
Sep 16 22:59:57 MK-Soft-Root2 sshd\[2919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.81.81
Sep 16 22:59:59 MK-Soft-Root2 sshd\[2919\]: Failed password for invalid user gpadmin from 27.254.81.81 port 43652 ssh2
...
2019-09-17 05:43:01
149.255.118.187 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-16 18:39:14,096 INFO [amun_request_handler] PortScan Detected on Port: 445 (149.255.118.187)
2019-09-17 05:57:59
117.50.46.36 attack
Sep 16 21:57:23 MK-Soft-VM6 sshd\[11349\]: Invalid user connect from 117.50.46.36 port 50872
Sep 16 21:57:23 MK-Soft-VM6 sshd\[11349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.46.36
Sep 16 21:57:25 MK-Soft-VM6 sshd\[11349\]: Failed password for invalid user connect from 117.50.46.36 port 50872 ssh2
...
2019-09-17 06:10:20
83.48.89.147 attack
Sep 17 00:24:06 pkdns2 sshd\[23213\]: Invalid user tpimuser from 83.48.89.147Sep 17 00:24:09 pkdns2 sshd\[23213\]: Failed password for invalid user tpimuser from 83.48.89.147 port 35115 ssh2Sep 17 00:28:16 pkdns2 sshd\[23389\]: Invalid user candice from 83.48.89.147Sep 17 00:28:18 pkdns2 sshd\[23389\]: Failed password for invalid user candice from 83.48.89.147 port 56762 ssh2Sep 17 00:32:19 pkdns2 sshd\[23568\]: Invalid user dayz from 83.48.89.147Sep 17 00:32:21 pkdns2 sshd\[23568\]: Failed password for invalid user dayz from 83.48.89.147 port 50335 ssh2
...
2019-09-17 06:03:22
139.162.122.110 attack
2019-09-16T21:23:09.666843abusebot-8.cloudsearch.cf sshd\[32041\]: Invalid user  from 139.162.122.110 port 37790
2019-09-17 05:31:45
106.12.24.1 attackspambots
Sep 16 17:56:47 ny01 sshd[12315]: Failed password for mail from 106.12.24.1 port 50318 ssh2
Sep 16 18:01:19 ny01 sshd[13313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.1
Sep 16 18:01:21 ny01 sshd[13313]: Failed password for invalid user tester from 106.12.24.1 port 32852 ssh2
2019-09-17 06:08:42
185.105.184.202 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/185.105.184.202/ 
 IR - 1H : (20)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IR 
 NAME ASN : ASN25264 
 
 IP : 185.105.184.202 
 
 CIDR : 185.105.184.0/24 
 
 PREFIX COUNT : 6 
 
 UNIQUE IP COUNT : 1792 
 
 
 WYKRYTE ATAKI Z ASN25264 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : Looking for resource vulnerabilities 403 Detected and Blocked by ADMIN  - data recovery
2019-09-17 05:52:51
203.160.132.4 attack
Sep 16 23:08:27 vps01 sshd[20302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.160.132.4
Sep 16 23:08:29 vps01 sshd[20302]: Failed password for invalid user user from 203.160.132.4 port 34404 ssh2
2019-09-17 05:33:21
159.89.111.136 attackspam
Sep 16 23:27:19 vps01 sshd[20580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136
Sep 16 23:27:22 vps01 sshd[20580]: Failed password for invalid user jdeleon from 159.89.111.136 port 34090 ssh2
2019-09-17 05:45:05
41.74.4.114 attack
Sep 16 21:10:07 ip-172-31-62-245 sshd\[3513\]: Invalid user johnf from 41.74.4.114\
Sep 16 21:10:09 ip-172-31-62-245 sshd\[3513\]: Failed password for invalid user johnf from 41.74.4.114 port 54378 ssh2\
Sep 16 21:14:32 ip-172-31-62-245 sshd\[3548\]: Invalid user ftp from 41.74.4.114\
Sep 16 21:14:34 ip-172-31-62-245 sshd\[3548\]: Failed password for invalid user ftp from 41.74.4.114 port 38604 ssh2\
Sep 16 21:18:54 ip-172-31-62-245 sshd\[3603\]: Invalid user caroot from 41.74.4.114\
2019-09-17 05:40:52
222.186.30.59 attackbotsspam
Sep 17 00:00:53 rotator sshd\[8689\]: Failed password for root from 222.186.30.59 port 12218 ssh2Sep 17 00:00:55 rotator sshd\[8689\]: Failed password for root from 222.186.30.59 port 12218 ssh2Sep 17 00:01:42 rotator sshd\[8695\]: Failed password for root from 222.186.30.59 port 52771 ssh2Sep 17 00:01:44 rotator sshd\[8695\]: Failed password for root from 222.186.30.59 port 52771 ssh2Sep 17 00:01:46 rotator sshd\[8695\]: Failed password for root from 222.186.30.59 port 52771 ssh2Sep 17 00:05:27 rotator sshd\[9460\]: Failed password for root from 222.186.30.59 port 49799 ssh2
...
2019-09-17 06:10:43
164.132.81.106 attackbotsspam
Sep 16 23:00:47 ns37 sshd[12156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.81.106
2019-09-17 05:41:43
192.227.252.30 attackspam
$f2bV_matches
2019-09-17 05:43:22
201.76.178.51 attackbotsspam
Sep 16 22:51:04 srv206 sshd[1712]: Invalid user postgres from 201.76.178.51
...
2019-09-17 05:31:14

Recently Reported IPs

117.245.1.241 251.16.53.214 88.199.21.89 183.7.146.196
152.32.250.36 45.139.104.204 146.190.96.133 37.32.119.254
216.180.246.57 155.117.98.111 42.236.17.84 34.141.183.66
93.123.109.60 180.243.13.117 196.251.71.120 143.255.242.244
20.163.30.205 222.141.37.25 20.226.160.19 87.120.191.94