Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Bangladesh

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.114.64.0 - 45.114.103.255
CIDR:           45.114.96.0/21, 45.114.64.0/19
NetName:        APNIC
NetHandle:      NET-45-114-64-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2014-09-05
Updated:        2025-10-29
Comment:        This IP address range is not registered in the ARIN database.
Comment:        This range was transferred to the APNIC Whois Database as
Comment:        part of the ERX (Early Registration Transfer) project.
Comment:        For details, refer to the APNIC Whois Database via
Comment:        WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl
Comment:        
Comment:        ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment:        for the Asia Pacific region. APNIC does not operate networks
Comment:        using this IP address range and is not able to investigate
Comment:        spam or abuse reports relating to these addresses. For more
Comment:        help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref:            https://rdap.arin.net/registry/ip/45.114.64.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '45.114.84.1 - 45.114.84.255'

% Abuse contact for '45.114.84.1 - 45.114.84.255' is 'ashikuzzaman@race.net.bd'

inetnum:        45.114.84.1 - 45.114.84.255
netname:        RACEONLINE-BD
descr:          Race Online Limited
country:        BD
admin-c:        ROLA1-AP
tech-c:         ROLA1-AP
abuse-c:        AR1005-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-RACEONLINE-BD
mnt-irt:        IRT-RACEONLINE-BD
last-modified:  2021-01-27T05:03:30Z
source:         APNIC

irt:            IRT-RACEONLINE-BD
address:        Race Online Ltd. Khwaja Tower (9th Floor),95 Mohakhali C/A, Bir Uttam A.K Khandaker Sharak,Dhaka-1212,Bangladesh
e-mail:         ashikuzzaman@race.net.bd
abuse-mailbox:  ashikuzzaman@race.net.bd
admin-c:        ROLA1-AP
tech-c:         ROLA1-AP
auth:           # Filtered
remarks:        ashikuzzaman@race.net.bd was validated on 2025-10-16
mnt-by:         MAINT-RACEONLINE-BD
last-modified:  2025-11-18T00:29:44Z
source:         APNIC

role:           ABUSE RACEONLINEBD
country:        ZZ
address:        Race Online Ltd. Khwaja Tower (9th Floor),95 Mohakhali C/A, Bir Uttam A.K Khandaker Sharak,Dhaka-1212,Bangladesh
phone:          +000000000
e-mail:         ashikuzzaman@race.net.bd
admin-c:        ROLA1-AP
tech-c:         ROLA1-AP
nic-hdl:        AR1005-AP
remarks:        Generated from irt object IRT-RACEONLINE-BD
remarks:        ashikuzzaman@race.net.bd was validated on 2025-10-16
abuse-mailbox:  ashikuzzaman@race.net.bd
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-16T09:41:46Z
source:         APNIC

role:           Race Online Limited administrator
address:        House-43 (6th Floor), Road-2/A , Dhanmondi, Dhaka-1209, Dhaka Dhanmondi 1209
country:        BD
phone:          +8809613234111
fax-no:         +8809613234111
e-mail:         abuse@race.net.bd
admin-c:        ROLA1-AP
tech-c:         ROLA1-AP
nic-hdl:        ROLA1-AP
mnt-by:         MAINT-RACEONLINE-BD
last-modified:  2015-10-04T12:46:25Z
source:         APNIC

% Information related to '45.114.84.0/24AS58715'

route:          45.114.84.0/24
origin:         AS58715
descr:          Earth Telecommunication (Pvt.) Ltd.
                Khwaja Tower (9th Floor),95 Mohakhali C/A,
                Bir Uttam A.K Khandaker Sharak,Dhaka-1212,Bangladesh
mnt-by:         MAINT-RACEONLINE-BD
last-modified:  2022-02-10T09:33:52Z
source:         APNIC

% Information related to '45.114.84.0/24AS63969'

route:          45.114.84.0/24
origin:         AS63969
descr:          Race Online Ltd.
                Khwaja Tower (9th Floor),95 Mohakhali C/A,
                Bir Uttam A.K Khandaker Sharak,Dhaka-1212,Bangladesh
mnt-by:         MAINT-RACEONLINE-BD
last-modified:  2022-02-10T09:35:08Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.114.84.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45668
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.114.84.126.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 14 08:00:10 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 126.84.114.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 126.84.114.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
212.64.111.18 attackspam
May 24 14:04:23 piServer sshd[15017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.111.18 
May 24 14:04:25 piServer sshd[15017]: Failed password for invalid user gss from 212.64.111.18 port 35636 ssh2
May 24 14:13:49 piServer sshd[16011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.111.18 
...
2020-05-24 22:44:18
186.251.224.200 attackbots
May 24 16:16:29 icinga sshd[33341]: Failed password for root from 186.251.224.200 port 43758 ssh2
May 24 16:27:34 icinga sshd[50878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.251.224.200 
May 24 16:27:36 icinga sshd[50878]: Failed password for invalid user norni from 186.251.224.200 port 59946 ssh2
...
2020-05-24 22:31:33
177.62.18.28 attackspambots
Port probing on unauthorized port 23
2020-05-24 22:12:53
118.193.32.219 attackbots
May 24 12:08:33 localhost sshd[80692]: Invalid user pqt from 118.193.32.219 port 39134
May 24 12:08:33 localhost sshd[80692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.32.219
May 24 12:08:33 localhost sshd[80692]: Invalid user pqt from 118.193.32.219 port 39134
May 24 12:08:34 localhost sshd[80692]: Failed password for invalid user pqt from 118.193.32.219 port 39134 ssh2
May 24 12:13:51 localhost sshd[81158]: Invalid user bfn from 118.193.32.219 port 60434
...
2020-05-24 22:42:01
190.129.49.62 attack
May 24 05:21:06 mockhub sshd[29629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.129.49.62
May 24 05:21:08 mockhub sshd[29629]: Failed password for invalid user server from 190.129.49.62 port 53308 ssh2
...
2020-05-24 22:39:09
181.65.164.179 attack
May 24 14:43:22 piServer sshd[18478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.65.164.179 
May 24 14:43:23 piServer sshd[18478]: Failed password for invalid user yvr from 181.65.164.179 port 40650 ssh2
May 24 14:47:41 piServer sshd[18835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.65.164.179 
...
2020-05-24 22:23:09
64.227.37.93 attackspambots
May 24 20:49:04 webhost01 sshd[7378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.37.93
May 24 20:49:06 webhost01 sshd[7378]: Failed password for invalid user yxs from 64.227.37.93 port 57854 ssh2
...
2020-05-24 22:46:42
213.217.0.101 attackspambots
May 24 14:42:28 debian-2gb-nbg1-2 kernel: \[12582956.913180\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=213.217.0.101 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=10429 PROTO=TCP SPT=42185 DPT=5362 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-24 22:26:33
159.65.228.82 attack
May 24 14:11:37 piServer sshd[15847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.228.82 
May 24 14:11:39 piServer sshd[15847]: Failed password for invalid user ser from 159.65.228.82 port 34480 ssh2
May 24 14:14:32 piServer sshd[16074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.228.82 
...
2020-05-24 22:11:16
62.30.62.194 attackspam
spam, phising, spoofing
2020-05-24 22:42:53
104.18.71.149 attack
"MarketingPromoSystems, 8 The Green Suite #5828 Dover DE" 185.230.46.95 - phishing redirect www1.innovationaltech.xyz
2020-05-24 22:11:41
222.186.180.142 attack
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-05-24 22:14:19
117.6.97.138 attackbotsspam
May 24 06:37:30 pixelmemory sshd[3224892]: Failed password for invalid user ftpuser from 117.6.97.138 port 24284 ssh2
May 24 06:39:23 pixelmemory sshd[3226813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.6.97.138  user=root
May 24 06:39:25 pixelmemory sshd[3226813]: Failed password for root from 117.6.97.138 port 4611 ssh2
May 24 06:41:12 pixelmemory sshd[3228510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.6.97.138  user=root
May 24 06:41:14 pixelmemory sshd[3228510]: Failed password for root from 117.6.97.138 port 24979 ssh2
...
2020-05-24 22:46:19
157.55.39.92 attackbotsspam
Automatic report - Banned IP Access
2020-05-24 22:28:54
182.48.230.18 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-05-24 22:24:08

Recently Reported IPs

72.56.5.167 121.230.89.177 2606:4700:10::6816:2940 2606:4700:10::ac43:2411
2606:4700:10::6814:8833 2606:4700:10::6814:7154 2606:4700:10::6814:5290 2606:4700:10::6814:8789
2606:4700:10::6816:2761 14.207.194.180 39.98.55.78 66.132.224.227
58.229.188.59 164.90.225.87 66.132.186.175 142.248.80.31
109.167.82.135 2606:4700:10::ac43:1855 2606:4700:10::6814:5189 2606:4700:10::6816:2332