Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Landsberg am Lech

Region: Bayern

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.59.12.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17391
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.59.12.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062701 1800 900 604800 86400

;; Query time: 169 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 05:38:27 CST 2025
;; MSG SIZE  rcvd: 105
Host info
145.12.59.91.in-addr.arpa domain name pointer p5b3b0c91.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.12.59.91.in-addr.arpa	name = p5b3b0c91.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.234.189.19 attackbotsspam
Jun  3 05:50:00 sso sshd[13080]: Failed password for root from 49.234.189.19 port 49314 ssh2
...
2020-06-03 12:04:36
14.175.175.112 attackspam
SMB Server BruteForce Attack
2020-06-03 12:12:50
195.158.8.206 attack
$f2bV_matches
2020-06-03 12:13:08
41.210.13.1 attack
Jun  3 03:59:04 IngegnereFirenze sshd[31663]: Failed password for invalid user admin from 41.210.13.1 port 34271 ssh2
...
2020-06-03 12:24:42
208.68.39.124 attack
Port scan denied
2020-06-03 08:21:58
195.122.226.164 attack
Jun  3 00:55:45 firewall sshd[28202]: Failed password for root from 195.122.226.164 port 59029 ssh2
Jun  3 00:59:23 firewall sshd[28332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.122.226.164  user=root
Jun  3 00:59:24 firewall sshd[28332]: Failed password for root from 195.122.226.164 port 63859 ssh2
...
2020-06-03 12:10:07
54.39.96.155 attackbots
Jun  2 23:50:10 pi sshd[20003]: Failed password for root from 54.39.96.155 port 50385 ssh2
2020-06-03 08:25:07
142.93.203.168 attackspam
142.93.203.168 has been banned for [WebApp Attack]
...
2020-06-03 12:03:47
115.231.231.3 attackbotsspam
Jun  3 05:54:33 [host] sshd[6112]: pam_unix(sshd:a
Jun  3 05:54:35 [host] sshd[6112]: Failed password
Jun  3 05:59:23 [host] sshd[6277]: pam_unix(sshd:a
2020-06-03 12:10:34
5.62.41.124 attackspam
[2020-06-03 00:03:34] Exploit probing - /wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php
2020-06-03 12:30:54
167.114.3.133 attackbotsspam
Jun  2 22:18:59 saturn sshd[316012]: Failed password for root from 167.114.3.133 port 37150 ssh2
Jun  2 22:23:21 saturn sshd[316191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.3.133  user=root
Jun  2 22:23:23 saturn sshd[316191]: Failed password for root from 167.114.3.133 port 42410 ssh2
...
2020-06-03 08:28:22
51.15.194.51 attackbotsspam
Jun  3 05:55:40 vmi345603 sshd[502]: Failed password for root from 51.15.194.51 port 45922 ssh2
...
2020-06-03 12:19:38
104.131.189.116 attack
Jun  2 17:15:37 ws24vmsma01 sshd[97163]: Failed password for root from 104.131.189.116 port 47638 ssh2
...
2020-06-03 08:23:54
179.227.173.59 attackspam
2020-06-03T05:59:11.301406amanda2.illicoweb.com sshd\[24022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.227.173.59  user=root
2020-06-03T05:59:12.891777amanda2.illicoweb.com sshd\[24022\]: Failed password for root from 179.227.173.59 port 65041 ssh2
2020-06-03T05:59:15.480963amanda2.illicoweb.com sshd\[24024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.227.173.59  user=root
2020-06-03T05:59:17.954457amanda2.illicoweb.com sshd\[24024\]: Failed password for root from 179.227.173.59 port 65042 ssh2
2020-06-03T05:59:20.207238amanda2.illicoweb.com sshd\[24026\]: Invalid user ubnt from 179.227.173.59 port 65043
...
2020-06-03 12:13:29
202.188.20.123 attackbotsspam
...
2020-06-03 12:29:19

Recently Reported IPs

197.108.240.215 65.190.233.65 60.71.229.10 145.178.48.184
52.212.51.214 48.92.112.140 76.115.216.227 39.175.95.26
44.86.31.207 37.168.8.72 33.151.34.231 38.188.251.19
222.210.244.87 110.189.156.243 153.23.171.203 34.5.185.170
113.201.251.7 215.202.246.141 208.244.147.238 184.218.90.204