Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: Lynet Internett AS

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
Port Scan
2020-02-21 06:30:23
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 37.191.139.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;37.191.139.45.			IN	A

;; AUTHORITY SECTION:
.			460	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022002 1800 900 604800 86400

;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 06:30:20 CST 2020
;; MSG SIZE  rcvd: 117
Host info
45.139.191.37.in-addr.arpa domain name pointer 45.37-191-139.fiber.lynet.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.139.191.37.in-addr.arpa	name = 45.37-191-139.fiber.lynet.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
78.47.145.91 attack
Automatic report - XMLRPC Attack
2020-01-11 19:34:40
196.246.211.138 attack
failed_logins
2020-01-11 19:36:02
70.28.36.24 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2020-01-11 19:41:32
123.169.102.82 attackbotsspam
Autoban   123.169.102.82 AUTH/CONNECT
2020-01-11 19:38:38
156.204.151.93 attackspambots
port scan and connect, tcp 23 (telnet)
2020-01-11 19:40:43
223.205.218.241 attack
1578718113 - 01/11/2020 05:48:33 Host: 223.205.218.241/223.205.218.241 Port: 445 TCP Blocked
2020-01-11 19:22:45
1.6.14.155 attack
1578718126 - 01/11/2020 05:48:46 Host: 1.6.14.155/1.6.14.155 Port: 445 TCP Blocked
2020-01-11 19:15:08
117.0.34.168 attackspam
Unauthorized connection attempt from IP address 117.0.34.168 on Port 445(SMB)
2020-01-11 19:17:06
62.28.34.125 attackspambots
Jan 11 10:17:19 ourumov-web sshd\[12201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.34.125  user=root
Jan 11 10:17:21 ourumov-web sshd\[12201\]: Failed password for root from 62.28.34.125 port 19309 ssh2
Jan 11 10:33:00 ourumov-web sshd\[13161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.34.125  user=root
...
2020-01-11 19:32:48
197.205.1.17 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-01-11 19:48:06
185.209.0.92 attack
firewall-block, port(s): 26389/tcp
2020-01-11 19:45:54
160.153.147.37 attackbots
Automatic report - XMLRPC Attack
2020-01-11 19:29:58
168.227.106.103 attackspambots
Automatic report - XMLRPC Attack
2020-01-11 19:10:02
125.27.197.237 attackbots
1578727739 - 01/11/2020 08:28:59 Host: 125.27.197.237/125.27.197.237 Port: 445 TCP Blocked
2020-01-11 19:37:12
183.82.120.66 attack
unauthorized connection attempt
2020-01-11 19:31:12

Recently Reported IPs

132.232.50.212 220.135.164.49 218.164.51.15 128.199.175.116
83.174.234.182 156.232.241.195 190.85.186.67 177.220.175.188
123.110.148.253 45.95.168.120 171.251.79.159 91.241.19.173
183.48.32.252 202.162.192.228 69.181.239.62 51.75.186.115
207.242.238.194 14.245.85.204 106.12.219.211 202.43.110.189