Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Landsberg am Lech

Region: Bayern

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.59.12.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17391
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.59.12.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062701 1800 900 604800 86400

;; Query time: 169 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 05:38:27 CST 2025
;; MSG SIZE  rcvd: 105
Host info
145.12.59.91.in-addr.arpa domain name pointer p5b3b0c91.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.12.59.91.in-addr.arpa	name = p5b3b0c91.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
77.104.69.214 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 13:14:06,204 INFO [amun_request_handler] PortScan Detected on Port: 445 (77.104.69.214)
2019-07-04 03:07:09
14.162.144.117 attack
Jul  3 17:21:38 mail sshd\[27070\]: Failed password for invalid user deploy from 14.162.144.117 port 21924 ssh2
Jul  3 17:37:40 mail sshd\[27168\]: Invalid user kw from 14.162.144.117 port 38331
...
2019-07-04 02:44:10
144.48.178.120 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 13:14:05,287 INFO [amun_request_handler] PortScan Detected on Port: 445 (144.48.178.120)
2019-07-04 03:08:55
178.128.76.6 attackbotsspam
$f2bV_matches
2019-07-04 02:54:41
122.228.19.79 attack
Honeypot hit.
2019-07-04 02:40:19
142.93.39.181 attack
Jul  3 16:18:01 srv-4 sshd\[11558\]: Invalid user hamish from 142.93.39.181
Jul  3 16:18:01 srv-4 sshd\[11558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.39.181
Jul  3 16:18:04 srv-4 sshd\[11558\]: Failed password for invalid user hamish from 142.93.39.181 port 59938 ssh2
...
2019-07-04 02:43:22
157.230.118.36 attackspambots
port scan and connect, tcp 22 (ssh)
2019-07-04 02:41:26
186.91.180.14 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 13:12:17,115 INFO [amun_request_handler] PortScan Detected on Port: 445 (186.91.180.14)
2019-07-04 03:18:38
51.211.182.41 attack
Unauthorized connection attempt from IP address 51.211.182.41 on Port 445(SMB)
2019-07-04 03:10:05
95.216.11.34 attackbots
do not respect robot.txt
2019-07-04 03:19:21
27.203.195.182 attack
37215/tcp 37215/tcp 37215/tcp...
[2019-05-06/07-03]54pkt,1pt.(tcp)
2019-07-04 03:08:22
213.230.99.248 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2019-07-04 02:34:16
106.12.194.79 attackspambots
Jul  3 15:17:12 vps65 sshd\[28738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.194.79  user=root
Jul  3 15:17:14 vps65 sshd\[28738\]: Failed password for root from 106.12.194.79 port 58184 ssh2
...
2019-07-04 03:09:15
162.255.116.226 attackbotsspam
$f2bV_matches
2019-07-04 02:35:09
46.101.221.138 attackbots
$f2bV_matches
2019-07-04 03:18:15

Recently Reported IPs

197.108.240.215 65.190.233.65 60.71.229.10 145.178.48.184
52.212.51.214 48.92.112.140 76.115.216.227 39.175.95.26
44.86.31.207 37.168.8.72 33.151.34.231 38.188.251.19
222.210.244.87 110.189.156.243 153.23.171.203 34.5.185.170
113.201.251.7 215.202.246.141 208.244.147.238 184.218.90.204