Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.0.59.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35453
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.0.59.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 21:50:43 CST 2025
;; MSG SIZE  rcvd: 103
Host info
Host 34.59.0.45.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 34.59.0.45.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
80.82.77.33 attack
Jun 15 01:21:41 debian-2gb-nbg1-2 kernel: \[14435611.229104\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.77.33 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=120 ID=56697 PROTO=TCP SPT=29011 DPT=3749 WINDOW=60745 RES=0x00 SYN URGP=0
2020-06-15 07:22:02
124.67.66.50 attack
Jun 14 19:47:02 vps46666688 sshd[1571]: Failed password for root from 124.67.66.50 port 36589 ssh2
Jun 14 19:49:06 vps46666688 sshd[1578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.67.66.50
...
2020-06-15 07:27:03
178.62.118.53 attack
2020-06-14T23:42:40.886389ns386461 sshd\[27248\]: Invalid user den from 178.62.118.53 port 57432
2020-06-14T23:42:40.891218ns386461 sshd\[27248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.118.53
2020-06-14T23:42:43.049591ns386461 sshd\[27248\]: Failed password for invalid user den from 178.62.118.53 port 57432 ssh2
2020-06-14T23:57:27.455811ns386461 sshd\[8027\]: Invalid user vacation from 178.62.118.53 port 55757
2020-06-14T23:57:27.460885ns386461 sshd\[8027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.118.53
...
2020-06-15 07:29:09
152.231.93.130 attackspam
Jun 13 14:39:08 carla sshd[31385]: Invalid user admin from 152.231.93.130
Jun 13 14:39:08 carla sshd[31385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.231.93.130 
Jun 13 14:39:10 carla sshd[31385]: Failed password for invalid user admin from 152.231.93.130 port 6846 ssh2
Jun 13 14:39:10 carla sshd[31386]: Received disconnect from 152.231.93.130: 11: Bye Bye
Jun 13 14:44:18 carla sshd[31392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.231.93.130  user=r.r
Jun 13 14:44:20 carla sshd[31392]: Failed password for r.r from 152.231.93.130 port 63524 ssh2
Jun 13 14:44:20 carla sshd[31393]: Received disconnect from 152.231.93.130: 11: Bye Bye
Jun 13 14:47:13 carla sshd[31467]: Invalid user fv from 152.231.93.130
Jun 13 14:47:13 carla sshd[31467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.231.93.130 


........
-----------------------------------------------
https://www.bl
2020-06-15 07:25:45
20.188.255.2 attackbotsspam
593. On Jun 14 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 20.188.255.2.
2020-06-15 07:09:19
77.107.41.175 attack
SE_OBDURO-MNT_<177>1592170022 [1:2403442:57977] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 72 [Classification: Misc Attack] [Priority: 2]:  {TCP} 77.107.41.175:63414
2020-06-15 06:57:18
80.90.82.70 attack
C1,WP GET /suche/wp-login.php
2020-06-15 06:54:00
161.35.226.47 attack
Jun 15 01:18:53 debian-2gb-nbg1-2 kernel: \[14435443.922529\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=161.35.226.47 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=54321 PROTO=TCP SPT=51155 DPT=8088 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-15 07:20:15
222.244.219.254 attack
Port Scan detected!
...
2020-06-15 07:12:54
111.229.109.26 attackspam
2020-06-15T00:26:40.724796afi-git.jinr.ru sshd[23885]: Failed password for root from 111.229.109.26 port 39658 ssh2
2020-06-15T00:26:43.488066afi-git.jinr.ru sshd[23903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.109.26  user=root
2020-06-15T00:26:45.932531afi-git.jinr.ru sshd[23903]: Failed password for root from 111.229.109.26 port 44422 ssh2
2020-06-15T00:26:47.939219afi-git.jinr.ru sshd[23916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.109.26  user=root
2020-06-15T00:26:50.598804afi-git.jinr.ru sshd[23916]: Failed password for root from 111.229.109.26 port 49880 ssh2
...
2020-06-15 07:04:32
114.67.64.28 attack
Jun 15 03:07:29 gw1 sshd[2928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.64.28
Jun 15 03:07:31 gw1 sshd[2928]: Failed password for invalid user jin from 114.67.64.28 port 48630 ssh2
...
2020-06-15 06:56:32
103.53.110.10 attack
Automatic report - Banned IP Access
2020-06-15 07:15:48
50.29.174.118 attackbotsspam
US_PenTeleData
PenTeleData_<177>1592173034 [1:2403376:57977] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 39 [Classification: Misc Attack] [Priority: 2]:  {TCP} 50.29.174.118:33940
2020-06-15 07:19:14
159.203.189.152 attackbotsspam
2020-06-14T23:38:52+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-06-15 07:22:18
104.131.189.4 attackspam
IP blocked
2020-06-15 07:15:35

Recently Reported IPs

176.163.252.136 103.223.0.213 240.205.47.56 233.63.212.109
245.89.170.138 2.245.223.33 88.196.143.188 92.180.156.45
6.50.148.35 178.89.162.93 190.110.97.127 80.149.213.106
4.190.213.223 101.190.67.181 127.201.54.21 147.26.208.209
237.116.118.74 27.19.222.134 172.141.9.34 16.230.37.187