Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Decatur

Region: Alabama

Country: United States

Internet Service Provider: RTC Communications LLC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.134.45.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54249
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.134.45.113.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012001 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 09:34:07 CST 2025
;; MSG SIZE  rcvd: 106
Host info
113.45.134.40.in-addr.arpa domain name pointer h113.45.134.40.static.ip.windstream.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
113.45.134.40.in-addr.arpa	name = h113.45.134.40.static.ip.windstream.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.178.184.226 attackspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-15 12:06:35
104.236.203.29 attackspam
port scan and connect, tcp 80 (http)
2020-08-15 12:26:26
85.93.20.26 attack
21 attempts against mh-misbehave-ban on float
2020-08-15 12:15:46
222.186.175.169 attackbots
Aug 15 06:17:09 santamaria sshd\[16028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Aug 15 06:17:11 santamaria sshd\[16028\]: Failed password for root from 222.186.175.169 port 43612 ssh2
Aug 15 06:17:31 santamaria sshd\[16034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
...
2020-08-15 12:21:37
62.102.148.69 attack
Aug 14 23:07:05 ssh2 sshd[40222]: Connection from 62.102.148.69 port 33861 on 192.240.101.3 port 22
Aug 14 23:07:07 ssh2 sshd[40222]: User root from 62.102.148.69 not allowed because not listed in AllowUsers
Aug 14 23:07:07 ssh2 sshd[40222]: Failed password for invalid user root from 62.102.148.69 port 33861 ssh2
...
2020-08-15 08:57:29
88.121.24.63 attack
web-1 [ssh_2] SSH Attack
2020-08-15 08:55:49
172.82.239.22 attack
Aug 15 02:49:17 mail.srvfarm.net postfix/smtpd[966773]: lost connection after STARTTLS from r22.news.eu.rvca.com[172.82.239.22]
Aug 15 02:51:26 mail.srvfarm.net postfix/smtpd[970941]: lost connection after STARTTLS from r22.news.eu.rvca.com[172.82.239.22]
Aug 15 02:52:28 mail.srvfarm.net postfix/smtpd[971000]: lost connection after STARTTLS from r22.news.eu.rvca.com[172.82.239.22]
Aug 15 02:54:34 mail.srvfarm.net postfix/smtpd[972706]: lost connection after STARTTLS from r22.news.eu.rvca.com[172.82.239.22]
Aug 15 02:55:46 mail.srvfarm.net postfix/smtpd[972632]: lost connection after STARTTLS from r22.news.eu.rvca.com[172.82.239.22]
2020-08-15 12:25:21
45.32.55.173 attack
Attempted access of administrative/configuration resources (looking for /.env)
2020-08-15 12:04:06
62.210.194.7 attack
Aug 15 02:49:16 mail.srvfarm.net postfix/smtpd[966773]: lost connection after STARTTLS from r7.news.eu.rvca.com[62.210.194.7]
Aug 15 02:51:25 mail.srvfarm.net postfix/smtpd[971000]: lost connection after STARTTLS from r7.news.eu.rvca.com[62.210.194.7]
Aug 15 02:52:30 mail.srvfarm.net postfix/smtpd[972036]: lost connection after STARTTLS from r7.news.eu.rvca.com[62.210.194.7]
Aug 15 02:54:35 mail.srvfarm.net postfix/smtpd[972706]: lost connection after STARTTLS from r7.news.eu.rvca.com[62.210.194.7]
Aug 15 02:55:47 mail.srvfarm.net postfix/smtpd[972632]: lost connection after STARTTLS from r7.news.eu.rvca.com[62.210.194.7]
2020-08-15 12:27:28
142.93.246.42 attackspam
fail2ban/Aug 15 01:39:24 h1962932 sshd[10329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.246.42  user=root
Aug 15 01:39:26 h1962932 sshd[10329]: Failed password for root from 142.93.246.42 port 56728 ssh2
Aug 15 01:43:47 h1962932 sshd[10531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.246.42  user=root
Aug 15 01:43:49 h1962932 sshd[10531]: Failed password for root from 142.93.246.42 port 37618 ssh2
Aug 15 01:48:07 h1962932 sshd[13310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.246.42  user=root
Aug 15 01:48:09 h1962932 sshd[13310]: Failed password for root from 142.93.246.42 port 46740 ssh2
2020-08-15 08:57:53
194.204.194.11 attackspambots
SSH Brute-Forcing (server2)
2020-08-15 08:56:42
51.254.156.114 attack
Aug 15 03:54:44 jumpserver sshd[158736]: Failed password for root from 51.254.156.114 port 42404 ssh2
Aug 15 03:57:40 jumpserver sshd[158775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.156.114  user=root
Aug 15 03:57:42 jumpserver sshd[158775]: Failed password for root from 51.254.156.114 port 40150 ssh2
...
2020-08-15 12:18:37
91.250.242.12 attack
CMS (WordPress or Joomla) login attempt.
2020-08-15 08:53:05
106.13.234.23 attackbots
Aug 15 03:39:17 marvibiene sshd[6882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.234.23  user=root
Aug 15 03:39:19 marvibiene sshd[6882]: Failed password for root from 106.13.234.23 port 48324 ssh2
Aug 15 03:58:07 marvibiene sshd[7044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.234.23  user=root
Aug 15 03:58:09 marvibiene sshd[7044]: Failed password for root from 106.13.234.23 port 49270 ssh2
2020-08-15 12:01:58
212.70.149.51 attackspam
Aug 15 06:22:35 cho postfix/smtpd[679969]: warning: unknown[212.70.149.51]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 15 06:23:04 cho postfix/smtpd[680939]: warning: unknown[212.70.149.51]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 15 06:23:32 cho postfix/smtpd[679969]: warning: unknown[212.70.149.51]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 15 06:24:01 cho postfix/smtpd[678780]: warning: unknown[212.70.149.51]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 15 06:24:29 cho postfix/smtpd[680939]: warning: unknown[212.70.149.51]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-15 12:28:43

Recently Reported IPs

81.64.191.173 236.148.25.25 134.30.34.25 228.123.62.8
24.9.31.54 255.158.156.232 255.11.31.129 124.179.240.170
6.62.252.85 211.115.51.186 141.1.41.73 175.242.32.129
247.45.87.66 41.68.56.62 225.174.246.25 177.224.137.52
25.35.145.185 8.158.98.151 97.98.110.228 22.162.183.137