Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.129.56.200 attackspambots
2020-09-13T21:18:40+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-09-14 03:19:38
45.129.56.200 attackspam
$f2bV_matches
2020-09-13 19:18:39
45.129.56.200 attack
contact form abuse
2020-08-11 02:40:23
45.129.56.200 attackspam
Attempted Brute Force (dovecot)
2020-08-09 03:54:37
45.129.56.200 attackbots
(mod_security) mod_security (id:949110) triggered by 45.129.56.200 (DK/Denmark/-): 10 in the last 3600 secs; ID: luc
2020-07-19 14:58:07
45.129.56.200 attackbots
Unauthorized connection attempt from IP address 45.129.56.200 on port 3389
2020-07-18 21:38:57
45.129.56.200 attackbotsspam
20 attempts against mh-misbehave-ban on flame
2020-07-16 07:02:15
45.129.56.200 attackbotsspam
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-07-11 23:05:28
45.129.56.200 attackbotsspam
prod6
...
2020-06-10 13:15:28
45.129.56.200 attackspambots
Jun  8 20:24:50 124388 sshd[29093]: Invalid user 12345678 from 45.129.56.200 port 42270
Jun  8 20:24:51 124388 sshd[29093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.129.56.200
Jun  8 20:24:50 124388 sshd[29093]: Invalid user 12345678 from 45.129.56.200 port 42270
Jun  8 20:24:53 124388 sshd[29093]: Failed password for invalid user 12345678 from 45.129.56.200 port 42270 ssh2
Jun  8 20:24:58 124388 sshd[29095]: Invalid user 12345678 from 45.129.56.200 port 51938
2020-06-09 06:17:20
45.129.56.200 attackspambots
failed_logins
2020-06-06 21:01:46
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.129.56.151
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1508
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.129.56.151.			IN	A

;; AUTHORITY SECTION:
.			207	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020601 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 12:32:57 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 151.56.129.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 151.56.129.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
31.8.60.34 attackbots
20/8/11@23:48:09: FAIL: Alarm-Intrusion address from=31.8.60.34
20/8/11@23:48:09: FAIL: Alarm-Intrusion address from=31.8.60.34
...
2020-08-12 18:02:04
148.235.82.68 attack
TCP port : 22996
2020-08-12 18:52:49
209.99.134.82 attack
Unauthorized access detected from black listed ip!
2020-08-12 17:37:20
66.249.64.197 attackspam
Automatic report - Banned IP Access
2020-08-12 18:32:16
37.49.230.128 attack
Mailserver and mailaccount attacks
2020-08-12 18:12:06
71.6.167.142 attackbots
Port scanning [2 denied]
2020-08-12 18:39:35
106.52.130.172 attackspam
2020-08-11 UTC: (32x) - root(32x)
2020-08-12 18:35:56
66.249.79.90 attackbots
Automatic report - Banned IP Access
2020-08-12 18:52:15
178.252.145.2 attack
20/8/11@23:47:25: FAIL: Alarm-Intrusion address from=178.252.145.2
...
2020-08-12 18:40:32
220.133.49.238 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-12 18:31:35
201.251.147.91 attack
Attempted Brute Force (dovecot)
2020-08-12 18:43:08
113.160.142.61 attack
Unauthorized connection attempt from IP address 113.160.142.61 on Port 445(SMB)
2020-08-12 18:13:10
103.246.240.26 attack
prod6
...
2020-08-12 18:05:24
116.103.107.20 attack
2020-08-11 22:36:51.327024-0500  localhost smtpd[4103]: NOQUEUE: reject: RCPT from unknown[116.103.107.20]: 554 5.7.1 Service unavailable; Client host [116.103.107.20] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/116.103.107.20; from= to= proto=ESMTP helo=<[116.103.107.20]>
2020-08-12 18:08:00
119.2.17.138 attackspambots
Aug 12 08:48:30 h2829583 sshd[26233]: Failed password for root from 119.2.17.138 port 44060 ssh2
2020-08-12 17:36:52

Recently Reported IPs

165.22.223.186 210.114.19.133 193.118.55.162 110.135.126.116
128.199.118.165 211.249.46.129 185.146.57.184 197.45.158.114
93.184.148.24 165.227.196.43 14.232.184.120 117.254.88.35
117.111.1.46 81.17.18.62 165.22.75.174 177.249.168.131
82.147.116.67 173.68.158.62 189.205.70.18 197.237.124.51