Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Linz

Region: Upper Austria

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.40.48.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53213
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.40.48.166.			IN	A

;; AUTHORITY SECTION:
.			478	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100100 1800 900 604800 86400

;; Query time: 115 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 02 00:23:26 CST 2020
;; MSG SIZE  rcvd: 117
Host info
166.48.40.145.in-addr.arpa domain name pointer 145-40-48-166.power-speed.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
166.48.40.145.in-addr.arpa	name = 145-40-48-166.power-speed.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
138.197.202.197 attack
Automatic report - Banned IP Access
2020-04-17 23:08:15
27.78.14.83 attack
2020-04-17T14:11:36.579945abusebot-8.cloudsearch.cf sshd[1004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.78.14.83  user=ftp
2020-04-17T14:11:38.507875abusebot-8.cloudsearch.cf sshd[1004]: Failed password for ftp from 27.78.14.83 port 36288 ssh2
2020-04-17T14:11:49.966452abusebot-8.cloudsearch.cf sshd[1016]: Invalid user ubnt from 27.78.14.83 port 36526
2020-04-17T14:12:10.187943abusebot-8.cloudsearch.cf sshd[1016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.78.14.83
2020-04-17T14:11:49.966452abusebot-8.cloudsearch.cf sshd[1016]: Invalid user ubnt from 27.78.14.83 port 36526
2020-04-17T14:12:11.448445abusebot-8.cloudsearch.cf sshd[1016]: Failed password for invalid user ubnt from 27.78.14.83 port 36526 ssh2
2020-04-17T14:12:50.169634abusebot-8.cloudsearch.cf sshd[1071]: Invalid user user from 27.78.14.83 port 35276
...
2020-04-17 22:48:17
173.239.232.11 attackbots
Failed login attempts
2020-04-17 22:54:47
212.92.123.172 attackspam
RDP brute forcing (d)
2020-04-17 22:49:03
121.168.8.229 attackspam
Apr  7 14:58:51 r.ca sshd[19283]: Failed password for root from 121.168.8.229 port 60246 ssh2
2020-04-17 23:09:58
24.20.244.45 attackspambots
*Port Scan* detected from 24.20.244.45 (US/United States/Oregon/Troutdale/c-24-20-244-45.hsd1.or.comcast.net). 4 hits in the last 185 seconds
2020-04-17 23:07:34
223.240.65.72 attack
2020-04-17T16:24:48.637095vps773228.ovh.net sshd[22060]: Invalid user ubuntu from 223.240.65.72 port 36234
2020-04-17T16:24:50.646481vps773228.ovh.net sshd[22060]: Failed password for invalid user ubuntu from 223.240.65.72 port 36234 ssh2
2020-04-17T16:25:39.971933vps773228.ovh.net sshd[22402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.240.65.72  user=root
2020-04-17T16:25:42.295992vps773228.ovh.net sshd[22402]: Failed password for root from 223.240.65.72 port 40346 ssh2
2020-04-17T16:26:37.190932vps773228.ovh.net sshd[22740]: Invalid user admin from 223.240.65.72 port 44458
...
2020-04-17 23:21:19
79.106.110.106 attack
failed_logins
2020-04-17 23:20:09
78.232.192.171 attackspambots
SSH bruteforce (Triggered fail2ban)
2020-04-17 23:30:19
137.74.158.143 attack
137.74.158.143 - - [17/Apr/2020:16:33:25 +0200] "GET /wp-login.php HTTP/1.1" 200 6582 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
137.74.158.143 - - [17/Apr/2020:16:33:26 +0200] "POST /wp-login.php HTTP/1.1" 200 7362 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
137.74.158.143 - - [17/Apr/2020:16:33:29 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-17 23:05:48
34.93.190.243 attackbots
SSH auth scanning - multiple failed logins
2020-04-17 23:04:10
128.199.165.221 attack
k+ssh-bruteforce
2020-04-17 22:49:32
68.183.169.251 attackspam
Automatic report - SSH Brute-Force Attack
2020-04-17 22:46:06
83.182.123.28 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-17 23:29:51
217.182.71.54 attackbots
$f2bV_matches
2020-04-17 23:12:29

Recently Reported IPs

152.197.213.48 82.143.70.179 32.245.59.234 100.142.125.6
70.228.72.11 170.207.146.210 108.77.128.200 165.65.195.13
171.250.54.138 217.129.188.173 72.197.242.48 3.232.43.151
166.35.98.53 209.128.122.15 1.142.194.116 63.37.189.151
133.117.230.34 65.10.238.161 112.148.44.4 204.191.184.145