Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Columbus

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.23.107.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;3.23.107.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 11:26:49 CST 2025
;; MSG SIZE  rcvd: 104
Host info
45.107.23.3.in-addr.arpa domain name pointer ec2-3-23-107-45.us-east-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.107.23.3.in-addr.arpa	name = ec2-3-23-107-45.us-east-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
207.46.13.94 attackbotsspam
Automatic report - Banned IP Access
2020-04-19 04:36:54
14.18.118.44 attack
Apr 18 22:32:29 legacy sshd[12288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.118.44
Apr 18 22:32:31 legacy sshd[12288]: Failed password for invalid user postgres from 14.18.118.44 port 40666 ssh2
Apr 18 22:36:27 legacy sshd[12438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.118.44
...
2020-04-19 04:45:59
197.51.189.195 attackbotsspam
Port probing on unauthorized port 445
2020-04-19 05:04:55
201.209.216.66 attackspambots
1587241225 - 04/18/2020 22:20:25 Host: 201.209.216.66/201.209.216.66 Port: 445 TCP Blocked
2020-04-19 05:10:38
118.89.31.153 attack
Apr 18 22:16:33 DAAP sshd[6750]: Invalid user admin from 118.89.31.153 port 45942
Apr 18 22:16:33 DAAP sshd[6750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.31.153
Apr 18 22:16:33 DAAP sshd[6750]: Invalid user admin from 118.89.31.153 port 45942
Apr 18 22:16:35 DAAP sshd[6750]: Failed password for invalid user admin from 118.89.31.153 port 45942 ssh2
Apr 18 22:20:43 DAAP sshd[6837]: Invalid user admin from 118.89.31.153 port 60732
...
2020-04-19 04:45:43
107.170.227.141 attack
Apr 18 22:07:51 ns382633 sshd\[13992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.227.141  user=root
Apr 18 22:07:53 ns382633 sshd\[13992\]: Failed password for root from 107.170.227.141 port 39978 ssh2
Apr 18 22:16:38 ns382633 sshd\[16231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.227.141  user=root
Apr 18 22:16:41 ns382633 sshd\[16231\]: Failed password for root from 107.170.227.141 port 33574 ssh2
Apr 18 22:22:54 ns382633 sshd\[17539\]: Invalid user postgres from 107.170.227.141 port 54478
Apr 18 22:22:54 ns382633 sshd\[17539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.227.141
2020-04-19 04:40:22
222.186.15.114 attack
2020-04-18T19:22:11.075902vps773228.ovh.net sshd[3284]: Failed password for root from 222.186.15.114 port 11207 ssh2
2020-04-18T19:22:12.953097vps773228.ovh.net sshd[3284]: Failed password for root from 222.186.15.114 port 11207 ssh2
2020-04-18T19:22:15.968913vps773228.ovh.net sshd[3284]: Failed password for root from 222.186.15.114 port 11207 ssh2
2020-04-18T22:48:18.695754vps773228.ovh.net sshd[15461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.114  user=root
2020-04-18T22:48:21.107173vps773228.ovh.net sshd[15461]: Failed password for root from 222.186.15.114 port 13480 ssh2
...
2020-04-19 04:49:25
106.54.228.25 attackbotsspam
$f2bV_matches
2020-04-19 04:41:59
185.53.91.28 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-19 04:45:28
59.167.51.198 attack
Apr 18 22:32:06 markkoudstaal sshd[23611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.167.51.198
Apr 18 22:32:08 markkoudstaal sshd[23611]: Failed password for invalid user fn from 59.167.51.198 port 37950 ssh2
Apr 18 22:38:00 markkoudstaal sshd[24664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.167.51.198
2020-04-19 04:38:14
186.91.24.200 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-19 04:43:27
77.68.114.140 attack
Apr 18 16:50:49 NPSTNNYC01T sshd[24431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.68.114.140
Apr 18 16:50:51 NPSTNNYC01T sshd[24431]: Failed password for invalid user oracle from 77.68.114.140 port 34478 ssh2
Apr 18 16:55:03 NPSTNNYC01T sshd[24786]: Failed password for root from 77.68.114.140 port 54540 ssh2
...
2020-04-19 04:56:01
218.78.10.183 attackspam
Apr 18 22:18:19 v22018086721571380 sshd[8837]: Failed password for invalid user yn from 218.78.10.183 port 42728 ssh2
2020-04-19 04:41:04
46.101.40.21 attackbots
2020-04-18T20:11:35.593191abusebot-7.cloudsearch.cf sshd[12468]: Invalid user jd from 46.101.40.21 port 43116
2020-04-18T20:11:35.598116abusebot-7.cloudsearch.cf sshd[12468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.40.21
2020-04-18T20:11:35.593191abusebot-7.cloudsearch.cf sshd[12468]: Invalid user jd from 46.101.40.21 port 43116
2020-04-18T20:11:37.572952abusebot-7.cloudsearch.cf sshd[12468]: Failed password for invalid user jd from 46.101.40.21 port 43116 ssh2
2020-04-18T20:20:48.475008abusebot-7.cloudsearch.cf sshd[13019]: Invalid user ht from 46.101.40.21 port 33434
2020-04-18T20:20:48.480264abusebot-7.cloudsearch.cf sshd[13019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.40.21
2020-04-18T20:20:48.475008abusebot-7.cloudsearch.cf sshd[13019]: Invalid user ht from 46.101.40.21 port 33434
2020-04-18T20:20:50.038422abusebot-7.cloudsearch.cf sshd[13019]: Failed password for invalid 
...
2020-04-19 04:40:41
45.148.10.184 attackbotsspam
SSH-bruteforce attempts
2020-04-19 04:56:49

Recently Reported IPs

239.229.190.27 5.134.119.147 245.176.122.39 143.10.210.89
217.52.255.104 214.229.104.232 207.109.190.23 87.37.181.232
34.181.66.107 95.162.222.217 106.44.185.154 210.146.10.179
71.93.124.85 137.45.196.53 45.138.222.26 207.33.138.146
159.21.194.229 21.235.27.32 2.190.119.27 181.186.102.63