Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.108.45.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61424
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.108.45.9.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 20:31:36 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 9.45.108.199.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 199.108.45.9.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
144.217.34.147 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-01 21:03:21
80.82.69.130 attackspam
Port scan(s) denied
2020-05-01 21:26:00
139.198.122.76 attackspam
May  1 13:43:31 melroy-server sshd[29406]: Failed password for git from 139.198.122.76 port 44876 ssh2
...
2020-05-01 21:13:42
51.75.206.42 attackbotsspam
Invalid user user from 51.75.206.42 port 40130
2020-05-01 21:34:01
198.108.67.32 attack
Port scan(s) denied
2020-05-01 21:34:17
66.117.12.196 attackspam
scans 2 times in preceeding hours on the ports (in chronological order) 16006 16006
2020-05-01 21:06:25
197.45.155.12 attackspam
Apr 30 10:33:05 mail sshd[32250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.45.155.12 
Apr 30 10:33:07 mail sshd[32250]: Failed password for invalid user gino from 197.45.155.12 port 18886 ssh2
...
2020-05-01 21:15:32
192.241.175.48 attackbots
May  1 20:04:26 webhost01 sshd[28939]: Failed password for root from 192.241.175.48 port 44086 ssh2
May  1 20:09:40 webhost01 sshd[29134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.175.48
...
2020-05-01 21:43:58
93.147.126.171 attack
firewall-block, port(s): 23/tcp
2020-05-01 21:20:09
39.37.217.124 attackspam
Unauthorised access (May  1) SRC=39.37.217.124 LEN=44 TTL=52 ID=23729 TCP DPT=23 WINDOW=21556 SYN
2020-05-01 21:30:41
124.118.129.5 attack
Invalid user england from 124.118.129.5 port 40644
2020-05-01 21:42:18
196.52.43.91 attackspam
444/tcp 83/tcp 44818/tcp...
[2020-03-04/04-30]56pkt,39pt.(tcp),4pt.(udp)
2020-05-01 21:07:47
212.102.44.87 attack
IP Address: 212.102.44.77 was executing brute force exchange server attack
2020-05-01 21:28:01
71.6.147.254 attackbotsspam
1588340636 - 05/01/2020 15:43:56 Host: 71.6.147.254/71.6.147.254 Port: 69 UDP Blocked
2020-05-01 21:44:24
159.89.53.236 attackbots
May  1 13:46:42 xeon sshd[9834]: Failed password for invalid user finish from 159.89.53.236 port 49532 ssh2
2020-05-01 21:35:44

Recently Reported IPs

7.171.132.52 59.210.112.120 85.124.39.248 58.38.211.175
43.58.223.153 9.126.169.142 167.124.14.233 191.182.19.12
70.9.2.239 243.29.202.250 165.175.72.70 79.196.22.139
80.220.220.240 230.139.60.24 81.180.123.6 149.30.182.40
174.15.11.59 207.84.28.171 232.14.19.67 166.253.48.38