Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: The Dalles

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.145.48.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20951
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.145.48.40.			IN	A

;; AUTHORITY SECTION:
.			304	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052300 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 00:26:40 CST 2023
;; MSG SIZE  rcvd: 105
Host info
40.48.145.34.in-addr.arpa domain name pointer 40.48.145.34.bc.googleusercontent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.48.145.34.in-addr.arpa	name = 40.48.145.34.bc.googleusercontent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.79.210.148 attack
Unauthorized connection attempt from IP address 27.79.210.148 on Port 445(SMB)
2020-01-16 19:45:25
72.94.181.219 attack
Unauthorized connection attempt detected from IP address 72.94.181.219 to port 2220 [J]
2020-01-16 19:49:41
94.25.230.115 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 16-01-2020 04:45:10.
2020-01-16 19:53:24
171.244.51.114 attackbotsspam
Unauthorized connection attempt detected from IP address 171.244.51.114 to port 2220 [J]
2020-01-16 19:54:30
167.99.86.90 attackspambots
GET requests (Part 2 of 2): 
/kcfinder-2.51/upload/files/up.php.jd
/language/en-GB/en-GB.xml
/libraries/jscripts/kcfinder/upload/files/up.php.jd
/public/upload_nhieuanh/server/php/files/up.php
/scripts/jquery/kcfinder/upload/files/up.php.jd
/server/php/files/up.php
/tpl/plugins/upload9.1.0/server/php/
/tpl/plugins/upload9.1.0/server/php/files/up.php
/tpl/plugins/upload9.1.0/server/php/up.php
/userfiles/file/spy.txt
/vehiculo_photos/server/php/files/up.php
/web/image/Images/up.php
2020-01-16 19:49:02
41.139.242.189 attackbots
"SMTP brute force auth login attempt."
2020-01-16 20:04:34
79.137.72.98 attack
Invalid user tester from 79.137.72.98 port 53503
2020-01-16 19:39:26
114.32.153.15 attackbots
Unauthorized connection attempt detected from IP address 114.32.153.15 to port 2220 [J]
2020-01-16 19:32:23
180.30.219.8 attack
Unauthorized connection attempt detected from IP address 180.30.219.8 to port 2220 [J]
2020-01-16 19:36:00
103.141.137.39 attackbotsspam
2020-01-16T12:41:08.138592www postfix/smtpd[20191]: warning: unknown[103.141.137.39]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-01-16T12:41:16.424479www postfix/smtpd[20191]: warning: unknown[103.141.137.39]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-01-16T12:41:29.144746www postfix/smtpd[20191]: warning: unknown[103.141.137.39]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-01-16 20:01:45
177.10.211.198 attack
Sending SPAM email
2020-01-16 19:51:23
154.202.24.161 attack
Phishing Site: Brand au(KDDI) / http://au-ok[.]com/
2020-01-16 19:31:51
36.82.9.252 attackbots
1579149904 - 01/16/2020 05:45:04 Host: 36.82.9.252/36.82.9.252 Port: 445 TCP Blocked
2020-01-16 20:00:15
45.183.94.67 attackspam
Unauthorized connection attempt detected from IP address 45.183.94.67 to port 22 [J]
2020-01-16 20:04:17
196.188.240.13 attack
1579149913 - 01/16/2020 05:45:13 Host: 196.188.240.13/196.188.240.13 Port: 445 TCP Blocked
2020-01-16 19:51:05

Recently Reported IPs

161.90.39.37 128.34.104.223 209.176.201.136 12.87.224.46
184.4.255.243 141.118.143.188 115.212.144.87 38.98.189.70
198.207.142.45 226.85.114.16 16.37.10.99 90.101.116.97
47.248.179.24 210.172.73.166 12.88.137.83 129.38.33.88
82.160.216.194 162.123.245.209 144.45.147.28 191.7.248.219