Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: São Paulo

Region: Sao Paulo

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.156.119.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50965
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.156.119.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121400 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 14 15:33:43 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 12.119.156.45.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 45.156.119.12.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
81.232.188.133 attack
Unauthorized connection attempt detected from IP address 81.232.188.133 to port 5555 [J]
2020-01-31 08:56:29
186.96.102.198 attack
Jan 31 01:52:31 tuxlinux sshd[31057]: Invalid user anuvitta from 186.96.102.198 port 52704
Jan 31 01:52:31 tuxlinux sshd[31057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.96.102.198 
Jan 31 01:52:31 tuxlinux sshd[31057]: Invalid user anuvitta from 186.96.102.198 port 52704
Jan 31 01:52:31 tuxlinux sshd[31057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.96.102.198 
...
2020-01-31 08:52:40
165.227.210.71 attackbotsspam
20 attempts against mh-ssh on echoip
2020-01-31 09:10:54
151.80.61.70 attack
Unauthorized connection attempt detected from IP address 151.80.61.70 to port 2220 [J]
2020-01-31 09:01:37
120.132.117.254 attackspam
Unauthorized connection attempt detected from IP address 120.132.117.254 to port 2220 [J]
2020-01-31 09:16:14
151.84.80.39 attack
Invalid user abhidhya from 151.84.80.39 port 38343
2020-01-31 08:38:52
1.55.109.203 attack
Unauthorized connection attempt detected from IP address 1.55.109.203 to port 445 [T]
2020-01-31 09:09:25
148.66.132.190 attackbotsspam
SSH Login Bruteforce
2020-01-31 08:59:26
117.48.231.173 attackbotsspam
Unauthorized connection attempt detected from IP address 117.48.231.173 to port 2220 [J]
2020-01-31 08:58:53
103.50.5.122 attackbotsspam
Fail2Ban Ban Triggered
2020-01-31 08:35:57
43.242.74.11 attack
Unauthorized connection attempt detected from IP address 43.242.74.11 to port 2220 [J]
2020-01-31 08:56:44
118.27.15.188 attackbots
Jan 30 09:51:53 XXX sshd[21951]: Invalid user zhangw from 118.27.15.188 port 55444
2020-01-31 09:14:42
190.186.198.18 attackspambots
Honeypot attack, port: 445, PTR: ip-adsl-190.186.198.18.cotas.com.bo.
2020-01-31 08:41:21
117.119.83.56 attack
Invalid user jay from 117.119.83.56 port 38404
2020-01-31 08:37:37
221.217.53.156 attackspambots
Unauthorized connection attempt detected from IP address 221.217.53.156 to port 22
2020-01-31 09:11:43

Recently Reported IPs

20.254.217.167 91.120.120.96 26.222.70.248 43.103.21.253
252.235.54.45 252.220.212.225 76.90.16.43 170.221.6.19
167.158.169.184 232.242.154.99 53.27.201.49 46.137.23.91
164.3.78.191 101.161.171.239 240.123.112.4 43.144.86.246
15.23.37.241 170.187.28.162 211.253.60.73 253.52.205.23