Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.45.49.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19572
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.45.49.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 18:00:41 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 40.49.45.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.49.45.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.248.240.113 attackspambots
05/05/2020-23:48:05.659332 218.248.240.113 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-05-06 18:39:50
138.219.12.234 attackbots
(sshd) Failed SSH login from 138.219.12.234 (SV/El Salvador/138-219-12-234.reverse.cablecolor.com.sv): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  6 05:48:10 ubnt-55d23 sshd[17237]: Invalid user admin from 138.219.12.234 port 20001
May  6 05:48:13 ubnt-55d23 sshd[17237]: Failed password for invalid user admin from 138.219.12.234 port 20001 ssh2
2020-05-06 18:35:31
138.68.82.194 attackbots
$f2bV_matches
2020-05-06 18:19:04
68.183.157.97 attackbotsspam
May  6 08:09:35 MainVPS sshd[12272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.157.97  user=root
May  6 08:09:38 MainVPS sshd[12272]: Failed password for root from 68.183.157.97 port 49210 ssh2
May  6 08:13:23 MainVPS sshd[15489]: Invalid user grodriguez from 68.183.157.97 port 59218
May  6 08:13:23 MainVPS sshd[15489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.157.97
May  6 08:13:23 MainVPS sshd[15489]: Invalid user grodriguez from 68.183.157.97 port 59218
May  6 08:13:25 MainVPS sshd[15489]: Failed password for invalid user grodriguez from 68.183.157.97 port 59218 ssh2
...
2020-05-06 18:46:23
129.158.107.185 attack
May  6 11:10:29 sso sshd[27593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.158.107.185
May  6 11:10:31 sso sshd[27593]: Failed password for invalid user nweidema from 129.158.107.185 port 3081 ssh2
...
2020-05-06 18:20:45
170.106.3.225 attack
$f2bV_matches
2020-05-06 18:23:21
138.68.106.62 attack
May  6 12:25:29 * sshd[24889]: Failed password for root from 138.68.106.62 port 35666 ssh2
2020-05-06 18:38:07
111.231.55.203 attackspam
May  6 11:08:39 host sshd[13165]: Invalid user yang from 111.231.55.203 port 35272
...
2020-05-06 18:28:05
27.124.113.161 attackbots
cPanel phishing scam
https://firebasestorage.googleapis.com/v0/b/inbxmailservce.appspot.com/o/update2020nwpass.html?alt=media&token=78ff1a44-fac0-47e6-8789-0c202ff9ef86#ARPODt9Fa
2020-05-06 18:20:04
137.74.119.50 attack
2020-05-06T09:34:59.848306server.espacesoutien.com sshd[29445]: Invalid user manu from 137.74.119.50 port 53796
2020-05-06T09:34:59.861025server.espacesoutien.com sshd[29445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.119.50
2020-05-06T09:34:59.848306server.espacesoutien.com sshd[29445]: Invalid user manu from 137.74.119.50 port 53796
2020-05-06T09:35:02.065690server.espacesoutien.com sshd[29445]: Failed password for invalid user manu from 137.74.119.50 port 53796 ssh2
2020-05-06T09:38:46.367672server.espacesoutien.com sshd[30173]: Invalid user jabber from 137.74.119.50 port 34654
...
2020-05-06 18:26:40
164.132.225.250 attackbots
May  6 11:22:36 vmd26974 sshd[5317]: Failed password for root from 164.132.225.250 port 34438 ssh2
...
2020-05-06 18:18:20
171.34.166.141 attack
Unauthorized connection attempt detected from IP address 171.34.166.141 to port 7001 [T]
2020-05-06 18:39:20
91.134.235.254 attack
frenzy
2020-05-06 18:33:50
222.186.190.2 attackbotsspam
May  6 12:27:31 pve1 sshd[9059]: Failed password for root from 222.186.190.2 port 57048 ssh2
May  6 12:27:34 pve1 sshd[9059]: Failed password for root from 222.186.190.2 port 57048 ssh2
...
2020-05-06 18:28:44
119.115.128.2 attack
ssh brute force
2020-05-06 18:40:15

Recently Reported IPs

53.0.197.105 65.105.186.176 43.210.45.169 9.251.234.239
199.149.206.113 187.127.40.210 108.103.112.251 249.185.222.235
201.46.56.193 4.249.221.41 114.247.122.245 103.207.43.71
164.239.20.87 29.233.42.80 172.133.222.23 130.82.240.99
59.252.14.218 149.141.57.108 147.200.123.59 211.156.249.6