Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.113.128.205 attack
Scan port
2023-10-26 21:38:42
45.113.128.205 attack
Scan port
2023-10-25 13:00:49
45.113.128.45 attack
DDoS
2023-10-25 12:58:37
45.113.158.64 attackbots
Automatic report - Banned IP Access
2020-08-07 15:01:00
45.113.105.6 attack
20/8/3@08:20:23: FAIL: Alarm-Telnet address from=45.113.105.6
...
2020-08-04 03:04:04
45.113.102.20 attack
Unauthorized connection attempt from IP address 45.113.102.20 on Port 445(SMB)
2020-07-13 06:01:21
45.113.100.234 attackbotsspam
20/4/2@08:41:27: FAIL: Alarm-Network address from=45.113.100.234
...
2020-04-03 03:53:18
45.113.159.11 attack
unauthorized connection attempt
2020-02-26 19:55:45
45.113.192.202 attackbotsspam
ICMP MH Probe, Scan /Distributed -
2020-02-13 22:17:46
45.113.107.157 attackbotsspam
Unauthorized connection attempt detected from IP address 45.113.107.157 to port 445 [T]
2020-01-15 22:25:24
45.113.106.212 attack
CloudCIX Reconnaissance Scan Detected, PTR: undefined.hostname.localhost.
2019-12-30 23:21:25
45.113.105.3 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-28 21:11:48
45.113.155.133 attackbots
Unauthorized connection attempt from IP address 45.113.155.133 on Port 445(SMB)
2019-11-29 04:05:08
45.113.105.3 attack
scan z
2019-11-23 15:32:19
45.113.122.172 attackspam
eintrachtkultkellerfulda.de 45.113.122.172 \[11/Oct/2019:05:51:35 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 408 "-" "Mozilla/5.0 \(Windows\; U\; Windows NT 5.1\; en-US\; rv:1.9.0.1\) Gecko/2008070208 Firefox/3.0.1"
eintrachtkultkellerfulda.de 45.113.122.172 \[11/Oct/2019:05:51:36 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 408 "-" "Mozilla/5.0 \(Windows\; U\; Windows NT 5.1\; en-US\; rv:1.9.0.1\) Gecko/2008070208 Firefox/3.0.1"
2019-10-11 16:38:50
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.113.1.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59330
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.113.1.18.			IN	A

;; AUTHORITY SECTION:
.			313	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022071302 1800 900 604800 86400

;; Query time: 131 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 14 06:12:40 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 18.1.113.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.1.113.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
82.194.11.37 attack
Telnet Server BruteForce Attack
2019-06-29 07:04:08
61.166.247.14 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-06-29 06:32:34
185.176.27.34 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-29 06:23:17
187.120.134.103 attack
SMTP-sasl brute force
...
2019-06-29 06:23:53
59.180.230.148 attack
Jun 28 23:50:58 mail sshd[20845]: Invalid user gitolite3 from 59.180.230.148
Jun 28 23:50:58 mail sshd[20845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.180.230.148
Jun 28 23:50:58 mail sshd[20845]: Invalid user gitolite3 from 59.180.230.148
Jun 28 23:51:00 mail sshd[20845]: Failed password for invalid user gitolite3 from 59.180.230.148 port 57324 ssh2
Jun 29 00:04:37 mail sshd[380]: Invalid user jct_txn from 59.180.230.148
...
2019-06-29 06:44:56
97.81.153.39 attack
TCP port 9000 (Trojan) attempt blocked by firewall. [2019-06-28 15:33:47]
2019-06-29 06:22:19
129.213.145.85 attack
Invalid user ryan from 129.213.145.85 port 24948
2019-06-29 06:43:32
51.68.243.1 attackspam
SSH-BruteForce
2019-06-29 06:47:07
118.69.124.184 attackbotsspam
Unauthorized connection attempt from IP address 118.69.124.184 on Port 445(SMB)
2019-06-29 07:05:43
54.37.44.75 attackbots
Invalid user hadoop from 54.37.44.75 port 52258
2019-06-29 06:45:20
149.200.165.97 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-06-29 06:36:14
180.232.96.162 attack
28.06.2019 22:21:53 SSH access blocked by firewall
2019-06-29 06:48:30
81.211.37.170 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-06-29 06:34:58
36.73.199.195 attack
Reported by AbuseIPDB proxy server.
2019-06-29 06:39:15
61.82.71.36 attackspam
IMAP brute force
...
2019-06-29 06:55:57

Recently Reported IPs

107.174.139.15 183.146.119.181 185.41.28.119 189.85.36.118
122.129.85.182 182.84.148.186 104.137.128.98 43.138.73.133
114.226.114.148 107.10.19.116 220.241.20.101 36.6.57.214
118.27.110.110 181.57.34.163 38.15.152.251 23.27.131.234
107.172.185.148 45.234.242.37 47.156.219.119 181.215.73.87