Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.1.70.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42384
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.1.70.3.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 00:17:51 CST 2025
;; MSG SIZE  rcvd: 102
Host info
Host 3.70.1.45.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 3.70.1.45.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
66.147.240.191 attackspambots
SSH login attempts.
2020-03-29 17:33:29
51.254.37.156 attackspam
(sshd) Failed SSH login from 51.254.37.156 (FR/France/156.ip-51-254-37.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 29 11:32:18 srv sshd[14592]: Invalid user core from 51.254.37.156 port 53754
Mar 29 11:32:19 srv sshd[14592]: Failed password for invalid user core from 51.254.37.156 port 53754 ssh2
Mar 29 11:37:13 srv sshd[15203]: Invalid user gif from 51.254.37.156 port 49738
Mar 29 11:37:15 srv sshd[15203]: Failed password for invalid user gif from 51.254.37.156 port 49738 ssh2
Mar 29 11:41:07 srv sshd[15714]: Invalid user cuj from 51.254.37.156 port 34670
2020-03-29 17:41:43
88.130.72.147 attackbots
Mar 29 06:49:14 www sshd\[57833\]: Invalid user helmuth from 88.130.72.147Mar 29 06:49:16 www sshd\[57833\]: Failed password for invalid user helmuth from 88.130.72.147 port 35428 ssh2Mar 29 06:56:19 www sshd\[57880\]: Invalid user www from 88.130.72.147
...
2020-03-29 18:08:17
188.125.72.74 attackbotsspam
SSH login attempts.
2020-03-29 17:37:27
139.59.43.128 attackbots
Automatic report - XMLRPC Attack
2020-03-29 17:54:52
59.0.138.65 attackbotsspam
SSH login attempts.
2020-03-29 17:47:40
190.85.108.186 attackspambots
Mar 29 09:09:55 vps sshd[19490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.108.186 
Mar 29 09:09:57 vps sshd[19490]: Failed password for invalid user gww from 190.85.108.186 port 44054 ssh2
Mar 29 09:23:31 vps sshd[20150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.108.186 
...
2020-03-29 18:10:36
104.198.187.202 attackbotsspam
Mar 28 08:18:43 web1 sshd[24907]: Failed password for nobody from 104.198.187.202 port 54492 ssh2
Mar 28 08:18:43 web1 sshd[24907]: Received disconnect from 104.198.187.202: 11: Bye Bye [preauth]
Mar 28 08:29:25 web1 sshd[25746]: Invalid user hgr from 104.198.187.202
Mar 28 08:29:27 web1 sshd[25746]: Failed password for invalid user hgr from 104.198.187.202 port 49722 ssh2
Mar 28 08:29:27 web1 sshd[25746]: Received disconnect from 104.198.187.202: 11: Bye Bye [preauth]
Mar 28 08:34:06 web1 sshd[26376]: Invalid user yix from 104.198.187.202
Mar 28 08:34:07 web1 sshd[26376]: Failed password for invalid user yix from 104.198.187.202 port 37094 ssh2
Mar 28 08:34:07 web1 sshd[26376]: Received disconnect from 104.198.187.202: 11: Bye Bye [preauth]
Mar 28 08:38:19 web1 sshd[26871]: Invalid user qhe from 104.198.187.202
Mar 28 08:38:21 web1 sshd[26871]: Failed password for invalid user qhe from 104.198.187.202 port 52700 ssh2
Mar 28 08:38:22 web1 sshd[26871]: Received disconnec........
-------------------------------
2020-03-29 18:06:26
178.165.123.233 attack
Hacked my account
2020-03-29 17:36:36
78.232.226.145 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/78.232.226.145/ 
 
 FR - 1H : (16)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : FR 
 NAME ASN : ASN12322 
 
 IP : 78.232.226.145 
 
 CIDR : 78.224.0.0/11 
 
 PREFIX COUNT : 16 
 
 UNIQUE IP COUNT : 11051008 
 
 
 ATTACKS DETECTED ASN12322 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 2 
 
 DateTime : 2020-03-29 05:56:31 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-29 17:50:22
181.63.248.149 attack
Tried sshing with brute force.
2020-03-29 17:27:30
103.139.181.64 attackspam
SSH login attempts.
2020-03-29 17:40:36
211.197.7.1 attack
Mar 29 08:33:24 mail sshd[24809]: Invalid user canecall from 211.197.7.1
Mar 29 08:33:24 mail sshd[24809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.197.7.1
Mar 29 08:33:24 mail sshd[24809]: Invalid user canecall from 211.197.7.1
Mar 29 08:33:26 mail sshd[24809]: Failed password for invalid user canecall from 211.197.7.1 port 65114 ssh2
...
2020-03-29 17:42:38
106.13.145.89 attackbotsspam
leo_www
2020-03-29 18:00:47
209.101.183.30 attack
SSH login attempts.
2020-03-29 18:09:42

Recently Reported IPs

181.197.181.30 160.102.207.188 215.172.103.11 254.163.91.201
13.30.255.21 86.88.205.235 25.156.9.106 206.35.228.97
50.75.242.117 38.1.98.217 51.150.47.119 72.121.70.93
79.104.15.250 254.123.176.106 140.208.215.68 175.193.77.91
241.36.182.182 47.215.116.17 126.78.141.122 222.63.36.241