Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Metro

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       173.45.0.0 - 173.45.63.255
CIDR:           173.45.0.0/18
NetName:        NET-173-45-0-0-1
NetHandle:      NET-173-45-0-0-1
Parent:         NET173 (NET-173-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Atlantic Metro Communications II, Inc. (AMCI-3)
RegDate:        2008-10-14
Updated:        2019-04-15
Ref:            https://rdap.arin.net/registry/ip/173.45.0.0


OrgName:        Atlantic Metro Communications II, Inc.
OrgId:          AMCI-3
Address:        4 Century Dr
City:           Parsippany
StateProv:      NJ
PostalCode:     07054
Country:        US
RegDate:        2017-10-03
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/AMCI-3

ReferralServer:  rwhois://whois.atlanticmetro.net:4321

OrgTechHandle: MOREN305-ARIN
OrgTechName:   Moreno, Soraya 
OrgTechPhone:  +1-561-869-3315 
OrgTechEmail:  smoreno@365datacenters.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MOREN305-ARIN

OrgTechHandle: ANOC10-ARIN
OrgTechName:   AMC Network Operations Center
OrgTechPhone:  +1-866-365-6246 
OrgTechEmail:  service@365datacenters.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ANOC10-ARIN

OrgTechHandle: FINAN16-ARIN
OrgTechName:   365-FINANCE
OrgTechPhone:  +1-866-365-6246 
OrgTechEmail:  payables@365datacenters.com
OrgTechRef:    https://rdap.arin.net/registry/entity/FINAN16-ARIN

OrgNOCHandle: ANOC10-ARIN
OrgNOCName:   AMC Network Operations Center
OrgNOCPhone:  +1-866-365-6246 
OrgNOCEmail:  service@365datacenters.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ANOC10-ARIN

OrgAbuseHandle: AMCAB-ARIN
OrgAbuseName:   AMC Abuse
OrgAbusePhone:  +1-866-365-6246 
OrgAbuseEmail:  abuse@atlanticmetro.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AMCAB-ARIN

# end


# start

NetRange:       173.45.18.0 - 173.45.18.255
CIDR:           173.45.18.0/24
NetName:        HORNET-SECURITY-01
NetHandle:      NET-173-45-18-0-1
Parent:         NET-173-45-0-0-1 (NET-173-45-0-0-1)
NetType:        Reassigned
OriginAS:       
Organization:   Hornetsecurity Inc. (HORNE-10)
RegDate:        2017-12-27
Updated:        2017-12-27
Ref:            https://rdap.arin.net/registry/ip/173.45.18.0


OrgName:        Hornetsecurity Inc.
OrgId:          HORNE-10
Address:        6425 Living Place, Suite 200
City:           Pittsburgh
StateProv:      PA
PostalCode:     15206
Country:        US
RegDate:        2017-12-27
Updated:        2017-12-27
Ref:            https://rdap.arin.net/registry/entity/HORNE-10


OrgAbuseHandle: HOFMA13-ARIN
OrgAbuseName:   Hofmann, Daniel 
OrgAbusePhone:  +1-511-515-4640 
OrgAbuseEmail:  abuse@hornetsecurity.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/HOFMA13-ARIN

OrgTechHandle: HOFMA12-ARIN
OrgTechName:   Hofmann, Daniel 
OrgTechPhone:  +1-511-515-4640 
OrgTechEmail:  info@hornetsecurity.com
OrgTechRef:    https://rdap.arin.net/registry/entity/HOFMA12-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.atlanticmetro.net:4321.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 173.45.18.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9427
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;173.45.18.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025100201 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 03 09:15:46 CST 2025
;; MSG SIZE  rcvd: 105
Host info
66.18.45.173.in-addr.arpa domain name pointer mx-relay26-hz5-if1.hornetsecurity.com.
Nslookup info:
b'66.18.45.173.in-addr.arpa	name = mx-relay26-hz5-if1.hornetsecurity.com.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.208 attackspambots
Aug  3 21:19:50 eventyay sshd[24402]: Failed password for root from 218.92.0.208 port 16663 ssh2
Aug  3 21:19:52 eventyay sshd[24402]: Failed password for root from 218.92.0.208 port 16663 ssh2
Aug  3 21:19:54 eventyay sshd[24402]: Failed password for root from 218.92.0.208 port 16663 ssh2
...
2020-08-04 03:40:10
110.175.128.62 attackspam
Tried sshing with brute force.
2020-08-04 03:37:22
172.69.68.188 attackbots
Aug 3 14:19:02 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=172.69.68.188 DST=79.143.186.54 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=33335 DF PROTO=TCP SPT=53284 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0 Aug 3 14:19:03 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=172.69.68.188 DST=79.143.186.54 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=33336 DF PROTO=TCP SPT=53284 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0 Aug 3 14:19:06 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=172.69.68.188 DST=79.143.186.54 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=33337 DF PROTO=TCP SPT=53284 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
2020-08-04 03:47:02
94.191.125.83 attackbotsspam
Aug  3 18:17:08 vmd17057 sshd[802]: Failed password for root from 94.191.125.83 port 35946 ssh2
...
2020-08-04 03:31:19
154.28.188.38 attack
Tried repeatedly to login into my qnap with account credentials "admin"
2020-08-04 03:51:27
112.85.42.89 attackspambots
Aug  4 00:51:47 dhoomketu sshd[2130759]: Failed password for root from 112.85.42.89 port 32064 ssh2
Aug  4 00:51:43 dhoomketu sshd[2130759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89  user=root
Aug  4 00:51:45 dhoomketu sshd[2130759]: Failed password for root from 112.85.42.89 port 32064 ssh2
Aug  4 00:51:47 dhoomketu sshd[2130759]: Failed password for root from 112.85.42.89 port 32064 ssh2
Aug  4 00:51:50 dhoomketu sshd[2130759]: Failed password for root from 112.85.42.89 port 32064 ssh2
...
2020-08-04 03:28:31
111.67.204.211 attackspam
Fail2Ban - SSH Bruteforce Attempt
2020-08-04 03:30:26
110.77.215.20 attackbotsspam
Automatic report - Port Scan Attack
2020-08-04 03:46:41
159.89.145.59 attackbotsspam
frenzy
2020-08-04 03:30:01
14.185.225.119 attack
1596457118 - 08/03/2020 14:18:38 Host: 14.185.225.119/14.185.225.119 Port: 445 TCP Blocked
2020-08-04 04:02:47
101.231.146.36 attackspambots
Aug  3 21:02:12 sso sshd[26824]: Failed password for root from 101.231.146.36 port 39017 ssh2
...
2020-08-04 03:50:38
222.186.30.218 attack
03.08.2020 19:30:13 SSH access blocked by firewall
2020-08-04 03:32:56
39.42.122.178 attackspambots
Automatic report - Port Scan Attack
2020-08-04 03:56:43
45.227.255.4 attack
2020-08-04T04:47:49.768789vps-web1.h3z.jp sshd[186682]: Invalid user pi from 45.227.255.4 port 5554
2020-08-04T04:47:51.297037vps-web1.h3z.jp sshd[186684]: Invalid user admin from 45.227.255.4 port 6202
2020-08-04T04:47:52.830541vps-web1.h3z.jp sshd[186686]: Invalid user ubnt from 45.227.255.4 port 6828
...
2020-08-04 03:53:55
114.143.230.186 attack
Unauthorized connection attempt from IP address 114.143.230.186
2020-08-04 03:48:46

Recently Reported IPs

176.65.148.95 216.180.246.110 198.235.24.231 183.7.149.216
165.232.72.65 8.216.66.248 165.227.169.10 134.122.94.176
107.170.48.75 46.101.116.146 45.32.210.176 185.107.44.223
167.99.247.28 164.92.180.118 164.92.169.104 60.15.135.240
23.185.120.117 192.168.38.40 183.7.17.31 34.141.130.179