Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.117.30.26 attack
Unauthorized connection attempt from IP address 45.117.30.26 on Port 445(SMB)
2020-03-09 03:11:47
45.117.32.2 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 17:00:25
45.117.3.83 attackspam
Automatic report - Port Scan Attack
2020-02-14 05:20:49
45.117.3.83 attackspam
Automatic report - Port Scan Attack
2019-11-25 03:06:33
45.117.30.26 attackspambots
Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445
2019-11-17 05:02:42
45.117.30.26 attack
Unauthorized connection attempt from IP address 45.117.30.26 on Port 445(SMB)
2019-11-10 04:23:25
45.117.30.26 attackbotsspam
Unauthorised access (Oct  6) SRC=45.117.30.26 LEN=52 PREC=0x20 TTL=109 ID=14822 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-06 12:07:25
45.117.30.26 attack
Unauthorized connection attempt from IP address 45.117.30.26 on Port 445(SMB)
2019-08-09 19:04:47
45.117.30.26 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 21:00:57,043 INFO [amun_request_handler] PortScan Detected on Port: 445 (45.117.30.26)
2019-07-21 06:07:18
45.117.30.26 attackbotsspam
Unauthorised access (Jul 10) SRC=45.117.30.26 LEN=48 PREC=0x20 TTL=108 ID=6384 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-11 02:48:12
45.117.30.26 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-08 22:33:18
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.117.3.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43676
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.117.3.58.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 07:37:04 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 58.3.117.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 58.3.117.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
64.227.25.180 attack
Port 16756 scan denied
2020-04-17 06:39:53
80.82.64.219 attackspam
Port 3389 (MS RDP) access denied
2020-04-17 06:35:19
176.32.34.250 attack
ET DROP Dshield Block Listed Source group 1 - port: 11211 proto: TCP cat: Misc Attack
2020-04-17 06:18:10
45.134.179.243 attack
Port 3300 scan denied
2020-04-17 06:47:33
79.124.62.86 attackspam
Port 2017 scan denied
2020-04-17 06:35:47
1.203.161.58 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 1 - port: 80 proto: TCP cat: Misc Attack
2020-04-17 06:51:42
195.154.241.121 attack
ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak
2020-04-17 06:53:19
87.251.74.18 attackbotsspam
Port 3389 (MS RDP) access denied
2020-04-17 06:30:48
61.221.167.145 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 49 - port: 23 proto: TCP cat: Misc Attack
2020-04-17 06:40:57
94.102.50.103 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-04-17 06:26:23
92.63.196.8 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 88 - port: 28027 proto: TCP cat: Misc Attack
2020-04-17 06:28:03
94.102.49.137 attackspambots
Port 22904 scan denied
2020-04-17 06:26:56
203.177.163.90 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-04-17 06:52:57
87.251.74.12 attackspambots
Port Scan: Events[1] countPorts[1]: 4344 ..
2020-04-17 06:31:34
80.82.77.234 attackspam
04/16/2020-18:21:36.361640 80.82.77.234 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-04-17 06:32:48

Recently Reported IPs

75.39.95.95 2a01:0c22:c063:3600:2484:b7a5:eb47:cfe7 121.136.118.94 122.13.206.119
141.56.23.51 87.74.13.110 185.135.45.137 62.234.182.220
63.104.254.159 89.59.101.120 81.120.161.240 191.163.49.124
119.41.81.195 54.72.90.80 53.47.230.206 155.185.195.145
28.217.226.69 45.100.104.10 30.220.10.187 52.109.176.144