Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.134.144.249 attack
Scan port
2023-08-17 12:49:52
45.134.144.249 attack
Scan port
2023-08-02 12:45:59
45.134.144.238 attack
Scan port
2023-08-02 12:43:51
45.134.144.77 botsattack
Scan port VoiP
2023-06-13 21:56:49
45.134.144.77 attack
Scan port
2023-06-13 21:26:32
45.134.144.4 attack
Scan port
2023-03-14 13:42:08
45.134.144.4 attack
Scan port
2023-03-09 13:49:08
45.134.144.138 attack
Port scan
2023-01-25 13:54:15
45.134.144.132 attack
Scan port
2022-12-29 13:47:07
45.134.144.101 attack
Brute scan
2022-11-29 13:40:26
45.134.144.101 attack
Scan port
2022-11-07 13:47:19
45.134.144.131 attackbots
Apr 21 07:29:10 hosting sshd[31798]: Invalid user oracle2 from 45.134.144.131 port 52782
...
2020-04-21 12:40:53
45.134.144.131 attackbotsspam
$f2bV_matches
2020-04-21 05:26:17
45.134.144.131 attack
SSH Brute-Force Attack
2020-04-21 01:01:49
45.134.144.131 attack
Feb 28 09:18:40 localhost sshd\[23112\]: Invalid user nagios from 45.134.144.131 port 55986
Feb 28 09:18:40 localhost sshd\[23112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.134.144.131
Feb 28 09:18:42 localhost sshd\[23112\]: Failed password for invalid user nagios from 45.134.144.131 port 55986 ssh2
2020-02-28 16:45:28
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.134.144.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.134.144.108.			IN	A

;; AUTHORITY SECTION:
.			27	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011802 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 19 13:04:54 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 108.144.134.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 108.144.134.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.202.25.158 attackbots
Unauthorized connection attempt from IP address 45.202.25.158 on Port 445(SMB)
2020-08-13 19:47:15
68.196.44.255 attack
Attempted connection to port 60001.
2020-08-13 19:32:20
183.136.145.234 attackbots
Attempted connection to port 1433.
2020-08-13 19:36:22
125.86.181.182 attackbotsspam
Attempted connection to ports 80, 1433, 6379, 7001, 7002, 8080, 8088, 9200.
2020-08-13 19:31:50
180.76.53.100 attack
Aug 13 12:46:21 vpn01 sshd[24022]: Failed password for root from 180.76.53.100 port 42158 ssh2
...
2020-08-13 19:52:01
180.168.212.6 attackbotsspam
Aug 13 05:31:35 havingfunrightnow sshd[28850]: Failed password for root from 180.168.212.6 port 2219 ssh2
Aug 13 05:44:24 havingfunrightnow sshd[29337]: Failed password for root from 180.168.212.6 port 2220 ssh2
...
2020-08-13 19:20:44
159.203.27.146 attackbotsspam
Bruteforce detected by fail2ban
2020-08-13 19:31:28
191.31.104.17 attackbotsspam
Aug 13 07:47:55 ift sshd\[16314\]: Invalid user abcd1234!@\#$ from 191.31.104.17Aug 13 07:47:57 ift sshd\[16314\]: Failed password for invalid user abcd1234!@\#$ from 191.31.104.17 port 9893 ssh2Aug 13 07:52:40 ift sshd\[16984\]: Invalid user passwordpassword!@\# from 191.31.104.17Aug 13 07:52:42 ift sshd\[16984\]: Failed password for invalid user passwordpassword!@\# from 191.31.104.17 port 31078 ssh2Aug 13 07:57:25 ift sshd\[17605\]: Invalid user htidc@111 from 191.31.104.17
...
2020-08-13 19:36:02
117.3.70.156 attackbots
Unauthorized connection attempt from IP address 117.3.70.156 on Port 445(SMB)
2020-08-13 20:02:11
167.71.96.148 attackbotsspam
Port scan denied
2020-08-13 19:25:47
182.74.119.254 attackspam
Unauthorized connection attempt from IP address 182.74.119.254 on Port 445(SMB)
2020-08-13 19:46:39
109.131.13.169 attackspam
Automatic report - Banned IP Access
2020-08-13 19:17:32
58.248.167.141 attackbotsspam
IP 58.248.167.141 attacked honeypot on port: 1433 at 8/12/2020 8:46:26 PM
2020-08-13 19:18:45
188.50.19.109 attack
Icarus honeypot on github
2020-08-13 19:37:15
49.37.205.41 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-13 19:30:49

Recently Reported IPs

54.228.46.29 254.5.245.62 25.47.251.130 195.82.50.59
68.110.248.65 221.141.209.135 28.88.10.181 243.164.65.222
131.24.171.194 93.55.226.123 215.43.7.50 117.7.247.141
28.213.121.54 10.213.105.234 154.74.180.177 119.51.17.230
161.88.166.135 213.78.1.8 16.117.77.35 185.217.190.231