Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.45.45.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51081
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.45.45.97.			IN	A

;; AUTHORITY SECTION:
.			208	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112700 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 27 21:04:34 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 97.45.45.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 97.45.45.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
212.64.28.77 attack
Sep 20 20:09:05 vserver sshd\[29966\]: Invalid user bl from 212.64.28.77Sep 20 20:09:07 vserver sshd\[29966\]: Failed password for invalid user bl from 212.64.28.77 port 45682 ssh2Sep 20 20:14:00 vserver sshd\[29980\]: Invalid user libuuid from 212.64.28.77Sep 20 20:14:01 vserver sshd\[29980\]: Failed password for invalid user libuuid from 212.64.28.77 port 53360 ssh2
...
2019-09-21 08:53:57
146.66.244.246 attackspambots
Invalid user lorelei from 146.66.244.246 port 40956
2019-09-21 09:18:03
66.185.210.121 attackbots
Sep 20 14:55:16 hiderm sshd\[27121\]: Invalid user ax400 from 66.185.210.121
Sep 20 14:55:16 hiderm sshd\[27121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cbl-66-185-210-121.vianet.ca
Sep 20 14:55:19 hiderm sshd\[27121\]: Failed password for invalid user ax400 from 66.185.210.121 port 49224 ssh2
Sep 20 14:59:32 hiderm sshd\[27510\]: Invalid user admin from 66.185.210.121
Sep 20 14:59:32 hiderm sshd\[27510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cbl-66-185-210-121.vianet.ca
2019-09-21 09:06:51
62.205.222.186 attack
Sep 20 14:27:27 hcbb sshd\[20158\]: Invalid user art from 62.205.222.186
Sep 20 14:27:27 hcbb sshd\[20158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.205.222.186
Sep 20 14:27:29 hcbb sshd\[20158\]: Failed password for invalid user art from 62.205.222.186 port 35352 ssh2
Sep 20 14:34:27 hcbb sshd\[20763\]: Invalid user webmaster from 62.205.222.186
Sep 20 14:34:27 hcbb sshd\[20763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.205.222.186
2019-09-21 08:50:20
134.209.176.128 attackspam
2019-09-20T20:47:23.8397341495-001 sshd\[61459\]: Invalid user ahvaugha from 134.209.176.128 port 40312
2019-09-20T20:47:23.8430121495-001 sshd\[61459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.176.128
2019-09-20T20:47:26.1631431495-001 sshd\[61459\]: Failed password for invalid user ahvaugha from 134.209.176.128 port 40312 ssh2
2019-09-20T20:53:51.7827741495-001 sshd\[61948\]: Invalid user budi from 134.209.176.128 port 53786
2019-09-20T20:53:51.7865231495-001 sshd\[61948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.176.128
2019-09-20T20:53:53.7054331495-001 sshd\[61948\]: Failed password for invalid user budi from 134.209.176.128 port 53786 ssh2
...
2019-09-21 09:19:52
118.253.143.64 attack
Unauthorised access (Sep 20) SRC=118.253.143.64 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=40766 TCP DPT=8080 WINDOW=57822 SYN 
Unauthorised access (Sep 19) SRC=118.253.143.64 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=36305 TCP DPT=8080 WINDOW=56947 SYN 
Unauthorised access (Sep 19) SRC=118.253.143.64 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=20967 TCP DPT=8080 WINDOW=56947 SYN
2019-09-21 08:46:19
190.111.249.177 attack
Sep 21 02:47:04 SilenceServices sshd[24001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.111.249.177
Sep 21 02:47:06 SilenceServices sshd[24001]: Failed password for invalid user school from 190.111.249.177 port 36182 ssh2
Sep 21 02:52:54 SilenceServices sshd[27664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.111.249.177
2019-09-21 08:54:27
147.139.136.237 attackspambots
Sep 20 13:28:59 kapalua sshd\[17863\]: Invalid user postgres from 147.139.136.237
Sep 20 13:28:59 kapalua sshd\[17863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
Sep 20 13:29:02 kapalua sshd\[17863\]: Failed password for invalid user postgres from 147.139.136.237 port 50114 ssh2
Sep 20 13:33:57 kapalua sshd\[18266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237  user=root
Sep 20 13:33:59 kapalua sshd\[18266\]: Failed password for root from 147.139.136.237 port 35878 ssh2
2019-09-21 09:22:48
213.32.21.139 attackspam
Sep 21 00:39:53 v22019058497090703 sshd[1177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.21.139
Sep 21 00:39:55 v22019058497090703 sshd[1177]: Failed password for invalid user phone from 213.32.21.139 port 45940 ssh2
Sep 21 00:45:08 v22019058497090703 sshd[1588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.21.139
...
2019-09-21 09:22:16
129.146.149.185 attack
Sep 21 00:42:21 xeon sshd[34248]: Failed password for invalid user vala from 129.146.149.185 port 49920 ssh2
2019-09-21 08:46:43
149.56.44.47 attackbotsspam
Sep 21 01:14:40 webhost01 sshd[28006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.44.47
Sep 21 01:14:43 webhost01 sshd[28006]: Failed password for invalid user abba from 149.56.44.47 port 56246 ssh2
...
2019-09-21 08:44:14
218.92.0.180 attack
Jul 23 11:48:02 microserver sshd[56973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.180  user=root
Jul 23 11:48:04 microserver sshd[56973]: Failed password for root from 218.92.0.180 port 60158 ssh2
Jul 23 11:48:07 microserver sshd[56973]: Failed password for root from 218.92.0.180 port 60158 ssh2
Jul 23 11:48:10 microserver sshd[56973]: Failed password for root from 218.92.0.180 port 60158 ssh2
Jul 23 11:48:13 microserver sshd[56973]: Failed password for root from 218.92.0.180 port 60158 ssh2
Jul 24 14:01:34 microserver sshd[42087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.180  user=root
Jul 24 14:01:36 microserver sshd[42087]: Failed password for root from 218.92.0.180 port 39987 ssh2
Jul 24 14:01:39 microserver sshd[42087]: Failed password for root from 218.92.0.180 port 39987 ssh2
Jul 24 14:01:41 microserver sshd[42087]: Failed password for root from 218.92.0.180 port 39987 ssh2
Jul 24 14:01:44 mi
2019-09-21 09:07:22
193.32.163.182 attack
Sep 21 02:20:49 MK-Soft-Root2 sshd\[30222\]: Invalid user admin from 193.32.163.182 port 41673
Sep 21 02:20:49 MK-Soft-Root2 sshd\[30222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.182
Sep 21 02:20:51 MK-Soft-Root2 sshd\[30222\]: Failed password for invalid user admin from 193.32.163.182 port 41673 ssh2
...
2019-09-21 08:51:48
192.42.116.17 attackspam
Sep 21 05:21:51 webhost01 sshd[3220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.42.116.17
Sep 21 05:21:53 webhost01 sshd[3220]: Failed password for invalid user addison from 192.42.116.17 port 47906 ssh2
...
2019-09-21 09:18:33
60.13.42.183 attackspambots
xmlrpc attack
2019-09-21 09:21:15

Recently Reported IPs

1.45.81.237 34.155.128.167 1.45.154.42 1.44.225.125
1.44.194.181 1.45.201.130 1.44.190.190 1.45.22.217
1.44.214.100 1.43.170.74 1.43.63.164 1.43.178.132
1.43.57.243 1.45.43.26 1.43.110.184 1.41.85.48
1.43.101.87 1.43.107.206 1.41.56.28 1.41.9.23