Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Bangladesh

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.113.239.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55534
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.113.239.68.			IN	A

;; AUTHORITY SECTION:
.			389	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 11:21:34 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 68.239.113.45.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 68.239.113.45.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.75 attackbotsspam
Dec 14 09:33:32 ns41 sshd[23548]: Failed password for root from 49.88.112.75 port 45413 ssh2
Dec 14 09:33:32 ns41 sshd[23548]: Failed password for root from 49.88.112.75 port 45413 ssh2
Dec 14 09:33:34 ns41 sshd[23548]: Failed password for root from 49.88.112.75 port 45413 ssh2
2019-12-14 16:38:53
191.193.88.120 attackspambots
Dec 14 07:55:29 microserver sshd[11067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.193.88.120  user=root
Dec 14 07:55:31 microserver sshd[11067]: Failed password for root from 191.193.88.120 port 42959 ssh2
Dec 14 08:03:41 microserver sshd[12125]: Invalid user server from 191.193.88.120 port 47069
Dec 14 08:03:41 microserver sshd[12125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.193.88.120
Dec 14 08:03:43 microserver sshd[12125]: Failed password for invalid user server from 191.193.88.120 port 47069 ssh2
Dec 14 08:33:06 microserver sshd[16841]: Invalid user test from 191.193.88.120 port 35277
Dec 14 08:33:06 microserver sshd[16841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.193.88.120
Dec 14 08:33:08 microserver sshd[16841]: Failed password for invalid user test from 191.193.88.120 port 35277 ssh2
Dec 14 08:40:19 microserver sshd[18139]: pam_unix(sshd:auth): aut
2019-12-14 16:08:37
195.154.223.226 attackspambots
Dec 14 09:00:37 vps691689 sshd[20339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.223.226
Dec 14 09:00:39 vps691689 sshd[20339]: Failed password for invalid user teamspeak3 from 195.154.223.226 port 39660 ssh2
...
2019-12-14 16:18:31
112.85.42.72 attackbots
Dec 14 09:20:03 eventyay sshd[22980]: Failed password for root from 112.85.42.72 port 48331 ssh2
Dec 14 09:23:31 eventyay sshd[23088]: Failed password for root from 112.85.42.72 port 60463 ssh2
...
2019-12-14 16:44:27
93.27.10.20 attack
Dec 14 08:57:34 MK-Soft-Root1 sshd[25703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.27.10.20 
Dec 14 08:57:36 MK-Soft-Root1 sshd[25703]: Failed password for invalid user guest from 93.27.10.20 port 56944 ssh2
...
2019-12-14 16:40:16
50.116.72.164 attackspambots
retro-gamer.club 50.116.72.164 [14/Dec/2019:07:28:09 +0100] "POST /wp-login.php HTTP/1.1" 200 6320 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
retro-gamer.club 50.116.72.164 [14/Dec/2019:07:28:11 +0100] "POST /wp-login.php HTTP/1.1" 200 6287 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-14 16:19:41
178.128.24.84 attackbots
Dec 14 02:58:21 ny01 sshd[16282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.24.84
Dec 14 02:58:24 ny01 sshd[16282]: Failed password for invalid user oracle from 178.128.24.84 port 43666 ssh2
Dec 14 03:04:59 ny01 sshd[17096]: Failed password for root from 178.128.24.84 port 51812 ssh2
2019-12-14 16:21:31
39.51.83.7 attack
2019-12-14 07:28:22 H=([39.51.83.7]) [39.51.83.7] F= rejected RCPT : relay not permitted
2019-12-14 07:28:25 H=([39.51.83.7]) [39.51.83.7] F= rejected RCPT : relay not permitted
...
2019-12-14 16:08:19
79.255.112.38 attack
Dec 14 13:44:17 areeb-Workstation sshd[14330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.255.112.38 
Dec 14 13:44:19 areeb-Workstation sshd[14330]: Failed password for invalid user 1925 from 79.255.112.38 port 46870 ssh2
...
2019-12-14 16:28:25
40.121.194.179 attackbots
Dec 14 09:05:26 meumeu sshd[7813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.121.194.179 
Dec 14 09:05:28 meumeu sshd[7813]: Failed password for invalid user admin from 40.121.194.179 port 47392 ssh2
Dec 14 09:11:47 meumeu sshd[8661]: Failed password for root from 40.121.194.179 port 56620 ssh2
...
2019-12-14 16:14:38
222.186.169.194 attackspam
Dec 14 08:33:07 sshgateway sshd\[16965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194  user=root
Dec 14 08:33:09 sshgateway sshd\[16965\]: Failed password for root from 222.186.169.194 port 22086 ssh2
Dec 14 08:33:22 sshgateway sshd\[16965\]: error: maximum authentication attempts exceeded for root from 222.186.169.194 port 22086 ssh2 \[preauth\]
2019-12-14 16:35:06
165.231.253.90 attackspambots
Dec 14 09:19:06 meumeu sshd[9561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.231.253.90 
Dec 14 09:19:08 meumeu sshd[9561]: Failed password for invalid user jessee from 165.231.253.90 port 41374 ssh2
Dec 14 09:25:42 meumeu sshd[10445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.231.253.90 
...
2019-12-14 16:34:08
122.14.228.229 attackspambots
Dec 14 09:29:06 MK-Soft-VM6 sshd[17230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.228.229 
Dec 14 09:29:08 MK-Soft-VM6 sshd[17230]: Failed password for invalid user qj from 122.14.228.229 port 46132 ssh2
...
2019-12-14 16:44:10
163.172.19.244 attack
Automatic report - XMLRPC Attack
2019-12-14 16:43:45
60.191.214.158 attackbots
1576304889 - 12/14/2019 07:28:09 Host: 60.191.214.158/60.191.214.158 Port: 445 TCP Blocked
2019-12-14 16:22:35

Recently Reported IPs

45.116.68.21 45.120.49.6 45.120.2.97 45.121.237.148
45.122.48.144 45.121.209.165 45.120.17.3 45.121.236.143
45.123.8.203 45.122.48.148 45.120.50.234 45.125.220.169
45.124.4.244 45.125.222.6 45.124.57.70 45.126.20.18
45.127.247.3 45.125.238.35 45.129.18.119 45.13.252.21