Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Zambia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.213.11.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57758
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.213.11.4.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 19:56:47 CST 2025
;; MSG SIZE  rcvd: 104
Host info
4.11.213.45.in-addr.arpa domain name pointer 4-11-213-45.r.airtel.co.zm.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.11.213.45.in-addr.arpa	name = 4-11-213-45.r.airtel.co.zm.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.29.33.74 attackspambots
Nov 27 13:32:30 sachi sshd\[8026\]: Invalid user szolt from 202.29.33.74
Nov 27 13:32:30 sachi sshd\[8026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.33.74
Nov 27 13:32:32 sachi sshd\[8026\]: Failed password for invalid user szolt from 202.29.33.74 port 39334 ssh2
Nov 27 13:39:49 sachi sshd\[8709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.33.74  user=root
Nov 27 13:39:51 sachi sshd\[8709\]: Failed password for root from 202.29.33.74 port 47436 ssh2
2019-11-28 09:12:16
115.218.189.252 attack
port scan/probe/communication attempt; port 23
2019-11-28 08:56:05
86.106.170.122 attackspam
Autoban   86.106.170.122 AUTH/CONNECT
2019-11-28 09:17:54
91.236.74.22 attack
Automatic report - Banned IP Access
2019-11-28 09:28:28
105.226.221.2 attackbots
port scan/probe/communication attempt; port 23
2019-11-28 09:31:28
218.92.0.141 attack
Nov 28 02:12:29 OPSO sshd\[10935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.141  user=root
Nov 28 02:12:31 OPSO sshd\[10935\]: Failed password for root from 218.92.0.141 port 25477 ssh2
Nov 28 02:12:35 OPSO sshd\[10935\]: Failed password for root from 218.92.0.141 port 25477 ssh2
Nov 28 02:12:38 OPSO sshd\[10935\]: Failed password for root from 218.92.0.141 port 25477 ssh2
Nov 28 02:12:41 OPSO sshd\[10935\]: Failed password for root from 218.92.0.141 port 25477 ssh2
2019-11-28 09:13:19
101.187.63.113 attackbotsspam
$f2bV_matches
2019-11-28 09:07:28
149.56.131.73 attackspambots
2019-11-28T00:57:19.857459abusebot.cloudsearch.cf sshd\[11766\]: Invalid user bgr from 149.56.131.73 port 56906
2019-11-28 09:04:51
115.55.130.171 attackspam
port scan/probe/communication attempt; port 23
2019-11-28 09:07:11
106.12.137.46 attackbotsspam
Nov 28 02:03:50 jane sshd[9092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.46 
Nov 28 02:03:52 jane sshd[9092]: Failed password for invalid user six from 106.12.137.46 port 59734 ssh2
...
2019-11-28 09:06:02
218.92.0.135 attack
Nov 28 01:56:58 srv206 sshd[2271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.135  user=root
Nov 28 01:56:59 srv206 sshd[2271]: Failed password for root from 218.92.0.135 port 15004 ssh2
...
2019-11-28 09:00:47
128.199.152.169 attack
Automatic report - SSH Brute-Force Attack
2019-11-28 09:30:37
201.171.233.217 attackbotsspam
Automatic report - Port Scan Attack
2019-11-28 09:23:41
103.87.136.245 attackbotsspam
port scan/probe/communication attempt; port 23
2019-11-28 09:33:18
112.132.75.40 attackspambots
port scan/probe/communication attempt; port 23
2019-11-28 09:13:55

Recently Reported IPs

194.232.238.50 181.2.252.3 31.245.220.75 201.69.81.132
42.94.193.124 29.114.95.16 155.34.185.201 252.79.89.9
159.245.248.117 211.98.52.255 241.124.221.251 228.247.227.149
116.99.143.23 2.239.81.206 214.20.132.15 2.121.109.53
231.208.46.230 149.11.118.199 45.74.21.164 242.207.230.129