Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.45.65.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42088
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.45.65.149.			IN	A

;; AUTHORITY SECTION:
.			113	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 134 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 12:52:12 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 149.65.45.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.65.45.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
133.130.119.178 attack
$f2bV_matches_ltvn
2019-08-28 20:55:45
117.187.139.96 attackspambots
Automatic report - Port Scan Attack
2019-08-28 20:38:01
177.91.254.34 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08280829)
2019-08-28 20:11:30
113.28.150.73 attackspambots
Aug 28 09:43:46 yabzik sshd[319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.28.150.73
Aug 28 09:43:48 yabzik sshd[319]: Failed password for invalid user paintball1 from 113.28.150.73 port 46529 ssh2
Aug 28 09:53:09 yabzik sshd[4064]: Failed password for root from 113.28.150.73 port 24481 ssh2
2019-08-28 20:17:57
212.21.66.6 attack
Aug 28 13:31:11 rotator sshd\[26577\]: Failed password for root from 212.21.66.6 port 6741 ssh2Aug 28 13:31:13 rotator sshd\[26577\]: Failed password for root from 212.21.66.6 port 6741 ssh2Aug 28 13:31:15 rotator sshd\[26577\]: Failed password for root from 212.21.66.6 port 6741 ssh2Aug 28 13:31:18 rotator sshd\[26577\]: Failed password for root from 212.21.66.6 port 6741 ssh2Aug 28 13:31:21 rotator sshd\[26577\]: Failed password for root from 212.21.66.6 port 6741 ssh2Aug 28 13:31:23 rotator sshd\[26577\]: Failed password for root from 212.21.66.6 port 6741 ssh2
...
2019-08-28 20:32:52
218.78.54.80 attack
Aug 28 00:19:46 web1 postfix/smtpd[11946]: warning: unknown[218.78.54.80]: SASL LOGIN authentication failed: authentication failure
...
2019-08-28 20:39:54
211.104.171.239 attackspambots
Aug 28 13:36:58 herz-der-gamer sshd[22435]: Invalid user pemp from 211.104.171.239 port 44918
...
2019-08-28 20:32:28
106.12.209.117 attackbots
SSH Bruteforce
2019-08-28 20:13:03
109.61.2.166 attack
SpamReport
2019-08-28 20:10:50
51.38.239.2 attackbotsspam
2019-08-28T12:16:38.147495abusebot.cloudsearch.cf sshd\[16107\]: Invalid user toyoda from 51.38.239.2 port 36414
2019-08-28 20:43:42
180.109.136.67 attackspambots
Aug 28 06:20:13 ks10 sshd[21980]: Failed password for root from 180.109.136.67 port 46172 ssh2
Aug 28 06:20:14 ks10 sshd[21980]: error: Received disconnect from 180.109.136.67 port 46172:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
...
2019-08-28 20:13:53
185.211.245.198 attackbots
Aug 28 14:17:10 andromeda postfix/smtpd\[18439\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: authentication failure
Aug 28 14:17:12 andromeda postfix/smtpd\[18453\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: authentication failure
Aug 28 14:17:51 andromeda postfix/smtpd\[18453\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: authentication failure
Aug 28 14:17:53 andromeda postfix/smtpd\[15107\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: authentication failure
Aug 28 14:17:59 andromeda postfix/smtpd\[20729\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: authentication failure
2019-08-28 20:24:48
59.42.62.235 attackspam
Fail2Ban - SSH Bruteforce Attempt
2019-08-28 20:56:45
206.189.166.172 attack
Aug 28 14:24:57 srv206 sshd[12380]: Invalid user abcd from 206.189.166.172
Aug 28 14:24:57 srv206 sshd[12380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.166.172
Aug 28 14:24:57 srv206 sshd[12380]: Invalid user abcd from 206.189.166.172
Aug 28 14:24:59 srv206 sshd[12380]: Failed password for invalid user abcd from 206.189.166.172 port 37256 ssh2
...
2019-08-28 20:46:07
103.39.109.39 attack
Unauthorized connection attempt from IP address 103.39.109.39 on Port 445(SMB)
2019-08-28 20:20:43

Recently Reported IPs

103.45.249.244 103.45.65.166 103.45.65.203 103.45.65.204
103.45.65.235 103.45.65.240 117.212.186.248 103.45.68.8
20.199.7.219 103.47.113.227 103.47.150.151 103.47.150.247
10.253.21.127 103.47.175.149 10.235.116.196 103.47.175.153
103.47.175.157 145.224.25.24 103.47.175.159 109.175.17.188