Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
199.45.155.109 spambotsattackproxy
Postfix attacker IP
2025-06-20 12:52:58
199.45.155.79 botsattackproxy
Malicious IP
2025-03-18 19:26:30
199.45.155.86 spamattackproxy
Postfix attacker IP
2025-01-27 14:06:07
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       199.45.154.0 - 199.45.155.255
CIDR:           199.45.154.0/23
NetName:        CENSY
NetHandle:      NET-199-45-154-0-1
Parent:         NET199 (NET-199-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Censys, Inc. (CENSY)
RegDate:        2022-10-26
Updated:        2024-03-29
Ref:            https://rdap.arin.net/registry/ip/199.45.154.0



OrgName:        Censys, Inc.
OrgId:          CENSY
Address:        116 1/2 S Main Street
City:           Ann Arbor
StateProv:      MI
PostalCode:     48104
Country:        US
RegDate:        2018-08-06
Updated:        2019-08-03
Comment:        https://censys.io
Ref:            https://rdap.arin.net/registry/entity/CENSY


OrgAbuseHandle: CAT20-ARIN
OrgAbuseName:   Censys Abuse Team
OrgAbusePhone:  +1-248-629-0125 
OrgAbuseEmail:  scan-abuse@censys.io
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CAT20-ARIN

OrgNOCHandle: COT12-ARIN
OrgNOCName:   Censys Operations Team
OrgNOCPhone:  +1-248-629-0125 
OrgNOCEmail:  ops@censys.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/COT12-ARIN

OrgTechHandle: COT12-ARIN
OrgTechName:   Censys Operations Team
OrgTechPhone:  +1-248-629-0125 
OrgTechEmail:  ops@censys.com
OrgTechRef:    https://rdap.arin.net/registry/entity/COT12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.45.155.65
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59918
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.45.155.65.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020400 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 04 21:30:23 CST 2026
;; MSG SIZE  rcvd: 106
Host info
65.155.45.199.in-addr.arpa domain name pointer 65.155.45.199.censys-scanner.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
65.155.45.199.in-addr.arpa	name = 65.155.45.199.censys-scanner.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
78.47.249.250 attack
Port probing on unauthorized port 6379
2020-06-16 07:32:07
45.122.221.210 attackbotsspam
Jun 15 23:17:41 lnxweb61 sshd[1976]: Failed password for root from 45.122.221.210 port 58510 ssh2
Jun 15 23:17:41 lnxweb61 sshd[1976]: Failed password for root from 45.122.221.210 port 58510 ssh2
2020-06-16 07:43:28
155.94.140.59 attackspambots
Invalid user yf from 155.94.140.59 port 34470
2020-06-16 07:15:54
46.105.148.212 attack
Invalid user wem from 46.105.148.212 port 49012
2020-06-16 07:05:32
103.80.36.34 attack
40. On Jun 15 2020 experienced a Brute Force SSH login attempt -> 48 unique times by 103.80.36.34.
2020-06-16 07:15:33
207.180.227.17 attackbotsspam
Jun 15 23:19:16 meumeu sshd[600500]: Invalid user technical from 207.180.227.17 port 38774
Jun 15 23:19:16 meumeu sshd[600500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.227.17 
Jun 15 23:19:16 meumeu sshd[600500]: Invalid user technical from 207.180.227.17 port 38774
Jun 15 23:19:19 meumeu sshd[600500]: Failed password for invalid user technical from 207.180.227.17 port 38774 ssh2
Jun 15 23:22:19 meumeu sshd[600768]: Invalid user ftp from 207.180.227.17 port 39354
Jun 15 23:22:19 meumeu sshd[600768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.227.17 
Jun 15 23:22:19 meumeu sshd[600768]: Invalid user ftp from 207.180.227.17 port 39354
Jun 15 23:22:21 meumeu sshd[600768]: Failed password for invalid user ftp from 207.180.227.17 port 39354 ssh2
Jun 15 23:25:25 meumeu sshd[601014]: Invalid user steam from 207.180.227.17 port 39954
...
2020-06-16 07:35:50
49.88.112.70 attackbots
5x Failed Password
2020-06-16 07:43:02
37.49.226.209 attack
none
2020-06-16 07:08:03
129.211.42.153 attackbotsspam
Jun 15 22:37:16 abendstille sshd\[30005\]: Invalid user ubuntu from 129.211.42.153
Jun 15 22:37:16 abendstille sshd\[30005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.42.153
Jun 15 22:37:18 abendstille sshd\[30005\]: Failed password for invalid user ubuntu from 129.211.42.153 port 53606 ssh2
Jun 15 22:42:17 abendstille sshd\[2757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.42.153  user=root
Jun 15 22:42:18 abendstille sshd\[2757\]: Failed password for root from 129.211.42.153 port 54128 ssh2
...
2020-06-16 07:16:30
183.134.91.158 attackspambots
SSH Invalid Login
2020-06-16 07:22:14
5.196.8.72 attack
Jun 15 23:09:56 game-panel sshd[9097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.8.72
Jun 15 23:09:58 game-panel sshd[9097]: Failed password for invalid user david from 5.196.8.72 port 37582 ssh2
Jun 15 23:13:24 game-panel sshd[9297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.8.72
2020-06-16 07:22:03
106.75.53.228 attack
Jun 16 00:47:26 * sshd[15599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.53.228
Jun 16 00:47:29 * sshd[15599]: Failed password for invalid user test from 106.75.53.228 port 55392 ssh2
2020-06-16 07:36:39
187.162.51.63 attackbotsspam
SSH Brute-Force. Ports scanning.
2020-06-16 07:33:15
62.210.206.78 attackbots
Invalid user ltv from 62.210.206.78 port 51600
2020-06-16 07:34:34
185.104.187.116 attack
comment spam
2020-06-16 07:32:27

Recently Reported IPs

36.140.28.93 2a0c:9a40:9210:2:be24:11ff:fee0:c0cc 38.60.137.197 58.222.129.125
17.241.75.155 17.241.219.4 107.158.19.79 70.39.176.172
109.87.124.239 109.160.82.77 72.11.155.223 46.191.187.107
12.233.136.191 103.217.194.20 134.195.196.125 204.252.117.113
47.92.138.117 31.134.6.192 193.56.20.182 140.235.171.199