Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
199.45.155.109 spambotsattackproxy
Postfix attacker IP
2025-06-20 12:52:58
199.45.155.79 botsattackproxy
Malicious IP
2025-03-18 19:26:30
199.45.155.86 spamattackproxy
Postfix attacker IP
2025-01-27 14:06:07
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       199.45.154.0 - 199.45.155.255
CIDR:           199.45.154.0/23
NetName:        CENSY
NetHandle:      NET-199-45-154-0-1
Parent:         NET199 (NET-199-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Censys, Inc. (CENSY)
RegDate:        2022-10-26
Updated:        2024-03-29
Ref:            https://rdap.arin.net/registry/ip/199.45.154.0



OrgName:        Censys, Inc.
OrgId:          CENSY
Address:        116 1/2 S Main Street
City:           Ann Arbor
StateProv:      MI
PostalCode:     48104
Country:        US
RegDate:        2018-08-06
Updated:        2019-08-03
Comment:        https://censys.io
Ref:            https://rdap.arin.net/registry/entity/CENSY


OrgTechHandle: COT12-ARIN
OrgTechName:   Censys Operations Team
OrgTechPhone:  +1-248-629-0125 
OrgTechEmail:  ops@censys.com
OrgTechRef:    https://rdap.arin.net/registry/entity/COT12-ARIN

OrgAbuseHandle: CAT20-ARIN
OrgAbuseName:   Censys Abuse Team
OrgAbusePhone:  +1-248-629-0125 
OrgAbuseEmail:  scan-abuse@censys.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CAT20-ARIN

OrgNOCHandle: COT12-ARIN
OrgNOCName:   Censys Operations Team
OrgNOCPhone:  +1-248-629-0125 
OrgNOCEmail:  ops@censys.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/COT12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.45.155.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13728
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.45.155.107.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025113000 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 30 15:30:20 CST 2025
;; MSG SIZE  rcvd: 107
Host info
107.155.45.199.in-addr.arpa domain name pointer scanner-206.hk2.censys-scanner.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
107.155.45.199.in-addr.arpa	name = scanner-206.hk2.censys-scanner.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.211.116.102 attackspambots
Sep 20 17:41:32 ip-172-31-62-245 sshd\[21900\]: Invalid user 1q2w3e4r from 80.211.116.102\
Sep 20 17:41:33 ip-172-31-62-245 sshd\[21900\]: Failed password for invalid user 1q2w3e4r from 80.211.116.102 port 60509 ssh2\
Sep 20 17:45:42 ip-172-31-62-245 sshd\[21944\]: Invalid user brad from 80.211.116.102\
Sep 20 17:45:43 ip-172-31-62-245 sshd\[21944\]: Failed password for invalid user brad from 80.211.116.102 port 52797 ssh2\
Sep 20 17:49:54 ip-172-31-62-245 sshd\[21957\]: Invalid user yb from 80.211.116.102\
2019-09-21 02:17:20
90.188.114.107 attack
Sep 20 00:01:09 hcbb sshd\[4955\]: Invalid user ubuntu from 90.188.114.107
Sep 20 00:01:09 hcbb sshd\[4955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.188.114.107
Sep 20 00:01:11 hcbb sshd\[4955\]: Failed password for invalid user ubuntu from 90.188.114.107 port 54434 ssh2
Sep 20 00:05:48 hcbb sshd\[5388\]: Invalid user bideonera from 90.188.114.107
Sep 20 00:05:48 hcbb sshd\[5388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.188.114.107
2019-09-21 02:12:54
112.112.104.70 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-09-21 02:01:39
145.239.91.88 attack
Sep 19 23:16:02 kapalua sshd\[30604\]: Invalid user ui from 145.239.91.88
Sep 19 23:16:02 kapalua sshd\[30604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.ip-145-239-91.eu
Sep 19 23:16:04 kapalua sshd\[30604\]: Failed password for invalid user ui from 145.239.91.88 port 57640 ssh2
Sep 19 23:20:33 kapalua sshd\[30991\]: Invalid user Administrator from 145.239.91.88
Sep 19 23:20:33 kapalua sshd\[30991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.ip-145-239-91.eu
2019-09-21 01:53:58
89.44.32.18 attackspambots
Hack attempt
2019-09-21 02:16:59
185.255.46.71 attackspambots
Spam Timestamp : 20-Sep-19 09:54   BlockList Provider  combined abuse   (684)
2019-09-21 01:55:14
81.1.242.70 attack
Sep 20 11:10:41 xeon cyrus/imap[18555]: badlogin: [81.1.242.70] plain [SASL(-13): authentication failure: Password verification failed]
2019-09-21 01:53:07
106.12.39.227 attackbotsspam
Tried sshing with brute force.
2019-09-21 02:12:34
62.234.106.199 attackbotsspam
Sep 20 15:58:29 vpn01 sshd\[27427\]: Invalid user aogola from 62.234.106.199
Sep 20 15:58:29 vpn01 sshd\[27427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.106.199
Sep 20 15:58:31 vpn01 sshd\[27427\]: Failed password for invalid user aogola from 62.234.106.199 port 53764 ssh2
2019-09-21 02:03:15
59.56.74.165 attack
Invalid user www from 59.56.74.165 port 43850
2019-09-21 02:13:26
116.202.25.162 attack
2019-09-20T18:09:37.330326abusebot-6.cloudsearch.cf sshd\[12411\]: Invalid user foxi from 116.202.25.162 port 47628
2019-09-21 02:16:41
170.80.224.240 attackbots
Sep 20 11:11:57 db sshd[2048]: error: maximum authentication attempts exceeded for invalid user admin from 170.80.224.240 port 59117 ssh2 [preauth]
...
2019-09-21 01:49:11
85.167.58.102 attackbotsspam
ssh failed login
2019-09-21 02:14:35
89.159.101.24 attackspam
TCP src-port=14088   dst-port=25    dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (674)
2019-09-21 02:14:15
154.8.184.140 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/154.8.184.140/ 
 JP - 1H : (50)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : JP 
 NAME ASN : ASN45090 
 
 IP : 154.8.184.140 
 
 CIDR : 154.8.160.0/19 
 
 PREFIX COUNT : 1788 
 
 UNIQUE IP COUNT : 2600192 
 
 
 WYKRYTE ATAKI Z ASN45090 :  
  1H - 2 
  3H - 5 
  6H - 7 
 12H - 10 
 24H - 21 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-21 01:49:33

Recently Reported IPs

167.172.156.203 57.180.15.86 161.35.199.233 195.178.110.54
40.90.250.163 14.212.107.120 155.117.98.112 154.28.229.158
103.4.251.240 47.76.227.105 205.210.31.206 112.121.183.114
20.83.27.89 113.14.255.169 112.121.183.78 182.104.90.211
183.7.145.207 35.197.120.140 172.20.32.52 149.119.33.10