Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.45.139.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62816
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.45.139.18.			IN	A

;; AUTHORITY SECTION:
.			406	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 04:32:21 CST 2024
;; MSG SIZE  rcvd: 105
Host info
Host 18.139.45.11.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.139.45.11.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.128.158.146 attackspam
Sep 15 09:27:33 MK-Soft-Root2 sshd\[16285\]: Invalid user gibson from 178.128.158.146 port 51044
Sep 15 09:27:33 MK-Soft-Root2 sshd\[16285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.158.146
Sep 15 09:27:35 MK-Soft-Root2 sshd\[16285\]: Failed password for invalid user gibson from 178.128.158.146 port 51044 ssh2
...
2019-09-15 15:46:56
207.46.13.137 attackspambots
Automatic report - Banned IP Access
2019-09-15 16:05:26
47.74.150.153 attackspambots
Sep 15 06:54:02 www sshd\[49032\]: Invalid user zcy from 47.74.150.153Sep 15 06:54:03 www sshd\[49032\]: Failed password for invalid user zcy from 47.74.150.153 port 42926 ssh2Sep 15 06:58:22 www sshd\[49100\]: Invalid user accounts from 47.74.150.153
...
2019-09-15 16:27:54
193.169.255.131 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-15 01:58:31,589 INFO [amun_request_handler] PortScan Detected on Port: 25 (193.169.255.131)
2019-09-15 16:13:39
163.172.218.246 attackspam
Sep 15 07:11:59 www sshd\[173757\]: Invalid user MBbRB951 from 163.172.218.246
Sep 15 07:11:59 www sshd\[173757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.218.246
Sep 15 07:12:01 www sshd\[173757\]: Failed password for invalid user MBbRB951 from 163.172.218.246 port 43825 ssh2
...
2019-09-15 16:09:10
190.151.105.182 attack
Sep 14 20:01:11 kapalua sshd\[29043\]: Invalid user csr from 190.151.105.182
Sep 14 20:01:11 kapalua sshd\[29043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.151.105.182
Sep 14 20:01:12 kapalua sshd\[29043\]: Failed password for invalid user csr from 190.151.105.182 port 34508 ssh2
Sep 14 20:06:45 kapalua sshd\[29516\]: Invalid user jose from 190.151.105.182
Sep 14 20:06:45 kapalua sshd\[29516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.151.105.182
2019-09-15 16:00:20
103.245.181.2 attackspambots
Sep 15 06:51:55 server sshd\[18446\]: Invalid user scan from 103.245.181.2 port 47994
Sep 15 06:51:55 server sshd\[18446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.245.181.2
Sep 15 06:51:57 server sshd\[18446\]: Failed password for invalid user scan from 103.245.181.2 port 47994 ssh2
Sep 15 06:56:14 server sshd\[31137\]: Invalid user server from 103.245.181.2 port 40092
Sep 15 06:56:14 server sshd\[31137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.245.181.2
2019-09-15 16:32:33
211.24.103.165 attack
2019-09-15T08:25:34.189767abusebot-8.cloudsearch.cf sshd\[22216\]: Invalid user student from 211.24.103.165 port 45371
2019-09-15 16:38:56
68.183.1.175 attackspam
Sep 14 20:27:36 web9 sshd\[22021\]: Invalid user client from 68.183.1.175
Sep 14 20:27:36 web9 sshd\[22021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.1.175
Sep 14 20:27:38 web9 sshd\[22021\]: Failed password for invalid user client from 68.183.1.175 port 49598 ssh2
Sep 14 20:31:36 web9 sshd\[22978\]: Invalid user shell from 68.183.1.175
Sep 14 20:31:36 web9 sshd\[22978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.1.175
2019-09-15 15:49:53
90.64.254.221 attackspam
Sep 15 03:40:52 TORMINT sshd\[13521\]: Invalid user barbara from 90.64.254.221
Sep 15 03:40:52 TORMINT sshd\[13521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.64.254.221
Sep 15 03:40:53 TORMINT sshd\[13521\]: Failed password for invalid user barbara from 90.64.254.221 port 47379 ssh2
...
2019-09-15 15:48:32
192.64.86.92 attackspam
Automatic report - Port Scan Attack
2019-09-15 16:11:57
105.159.173.62 attack
Automatic report - Port Scan Attack
2019-09-15 16:22:43
62.210.167.202 attackspam
\[2019-09-15 03:51:50\] SECURITY\[20693\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-15T03:51:50.289-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="14242671090",SessionID="0x7f8a6c362808",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.167.202/62767",ACLName="no_extension_match"
\[2019-09-15 03:53:33\] SECURITY\[20693\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-15T03:53:33.470-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="914242671090",SessionID="0x7f8a6c6094e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.167.202/54231",ACLName="no_extension_match"
\[2019-09-15 03:55:35\] SECURITY\[20693\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-15T03:55:35.211-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01114242671090",SessionID="0x7f8a6c362808",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.167.202/52996",ACLName="no_exten
2019-09-15 15:59:16
192.241.213.168 attack
Sep 15 07:00:07 site2 sshd\[62382\]: Invalid user custlink from 192.241.213.168Sep 15 07:00:09 site2 sshd\[62382\]: Failed password for invalid user custlink from 192.241.213.168 port 49488 ssh2Sep 15 07:04:14 site2 sshd\[62573\]: Invalid user admindb from 192.241.213.168Sep 15 07:04:16 site2 sshd\[62573\]: Failed password for invalid user admindb from 192.241.213.168 port 35960 ssh2Sep 15 07:08:26 site2 sshd\[62713\]: Invalid user 123456 from 192.241.213.168
...
2019-09-15 15:43:57
103.86.50.211 attackspam
103.86.50.211 - - [15/Sep/2019:09:22:45 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.86.50.211 - - [15/Sep/2019:09:22:46 +0200] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.86.50.211 - - [15/Sep/2019:09:22:47 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.86.50.211 - - [15/Sep/2019:09:22:48 +0200] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.86.50.211 - - [15/Sep/2019:09:22:49 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.86.50.211 - - [15/Sep/2019:09:22:50 +0200] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-09-15 16:36:40

Recently Reported IPs

11.42.206.68 11.43.62.34 11.44.110.7 11.44.141.103
11.43.254.22 11.44.199.208 11.46.214.180 11.44.12.82
11.46.109.205 11.42.146.148 11.48.244.210 11.43.18.180
11.45.145.104 11.44.175.178 11.44.197.109 11.42.154.247
11.44.145.179 11.41.85.251 11.42.62.233 11.42.122.33