Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hartford

Region: Connecticut

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.209.41.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50318
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.209.41.45.			IN	A

;; AUTHORITY SECTION:
.			375	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103101 1800 900 604800 86400

;; Query time: 211 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 08:10:30 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 45.41.209.157.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.136, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 45.41.209.157.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
201.55.81.254 attackspam
firewall-block, port(s): 445/tcp
2019-08-10 22:52:25
92.116.188.236 attack
Honeypot hit.
2019-08-10 23:17:30
54.37.68.66 attackspambots
Aug 10 10:59:23 plusreed sshd[28250]: Invalid user security from 54.37.68.66
...
2019-08-10 23:04:58
78.154.39.53 attack
19/8/10@08:19:00: FAIL: IoT-Telnet address from=78.154.39.53
...
2019-08-10 23:54:42
198.50.138.230 attackbotsspam
Aug 10 17:29:50 SilenceServices sshd[7883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.138.230
Aug 10 17:29:52 SilenceServices sshd[7883]: Failed password for invalid user team from 198.50.138.230 port 42872 ssh2
Aug 10 17:34:13 SilenceServices sshd[11790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.138.230
2019-08-10 23:55:27
68.183.203.40 attackspam
Aug 10 15:18:40 db sshd\[12861\]: Invalid user fake from 68.183.203.40
Aug 10 15:18:40 db sshd\[12861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.203.40 
Aug 10 15:18:43 db sshd\[12861\]: Failed password for invalid user fake from 68.183.203.40 port 38524 ssh2
Aug 10 15:18:43 db sshd\[12863\]: Invalid user ubnt from 68.183.203.40
Aug 10 15:18:43 db sshd\[12863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.203.40 
...
2019-08-10 23:08:18
91.206.15.52 attackbots
firewall-block, port(s): 3391/tcp
2019-08-10 23:11:07
216.218.206.73 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-10 23:44:43
41.137.137.92 attack
Aug 10 14:17:44 MK-Soft-VM7 sshd\[28144\]: Invalid user vhost from 41.137.137.92 port 60913
Aug 10 14:17:44 MK-Soft-VM7 sshd\[28144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.137.137.92
Aug 10 14:17:46 MK-Soft-VM7 sshd\[28144\]: Failed password for invalid user vhost from 41.137.137.92 port 60913 ssh2
...
2019-08-10 23:00:11
104.248.158.0 attackspambots
SSH invalid-user multiple login try
2019-08-10 23:16:45
104.198.196.151 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-08-10 23:43:41
201.233.5.177 attackbots
Automatic report - Port Scan Attack
2019-08-10 23:31:48
197.52.38.73 attack
Aug 10 13:54:14 own sshd[934]: Invalid user admin from 197.52.38.73
Aug 10 13:54:14 own sshd[934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.52.38.73
Aug 10 13:54:16 own sshd[934]: Failed password for invalid user admin from 197.52.38.73 port 47289 ssh2
Aug 10 13:54:16 own sshd[934]: Connection closed by 197.52.38.73 port 47289 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=197.52.38.73
2019-08-10 23:59:56
139.59.92.10 attackbots
Mar  5 12:03:07 motanud sshd\[30724\]: Invalid user nagios from 139.59.92.10 port 33302
Mar  5 12:03:07 motanud sshd\[30724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.92.10
Mar  5 12:03:10 motanud sshd\[30724\]: Failed password for invalid user nagios from 139.59.92.10 port 33302 ssh2
2019-08-10 22:50:58
54.37.204.154 attack
Automatic report - Banned IP Access
2019-08-10 23:53:22

Recently Reported IPs

146.233.11.142 135.152.39.81 166.133.39.14 135.36.11.172
29.93.80.176 2.52.164.41 22.191.10.121 226.182.206.220
102.37.30.65 250.17.122.3 17.244.59.73 17.54.3.72
19.134.192.226 251.116.227.123 60.211.194.212 193.232.134.119
210.30.120.217 138.207.203.156 157.48.225.111 98.192.179.71