Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.136.153.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48572
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.136.153.134.			IN	A

;; AUTHORITY SECTION:
.			589	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023091601 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 17 06:27:44 CST 2023
;; MSG SIZE  rcvd: 107
Host info
134.153.136.45.in-addr.arpa domain name pointer unn-45-136-153-134.datapacket.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.153.136.45.in-addr.arpa	name = unn-45-136-153-134.datapacket.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
180.76.148.87 attack
Jul  7 14:20:09 vps647732 sshd[29635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.148.87
Jul  7 14:20:11 vps647732 sshd[29635]: Failed password for invalid user mail1 from 180.76.148.87 port 53801 ssh2
...
2020-07-08 01:16:17
106.13.33.78 attackbotsspam
Brute force SSH attack
2020-07-08 01:30:18
49.88.112.111 attackbotsspam
Jul  7 09:40:29 dignus sshd[14171]: Failed password for root from 49.88.112.111 port 29551 ssh2
Jul  7 09:41:11 dignus sshd[14257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
Jul  7 09:41:13 dignus sshd[14257]: Failed password for root from 49.88.112.111 port 12058 ssh2
Jul  7 09:41:16 dignus sshd[14257]: Failed password for root from 49.88.112.111 port 12058 ssh2
Jul  7 09:41:18 dignus sshd[14257]: Failed password for root from 49.88.112.111 port 12058 ssh2
...
2020-07-08 01:05:43
103.133.111.44 attackbotsspam
Rude login attack (12 tries in 1d)
2020-07-08 01:41:33
94.246.169.55 attack
2020-07-0717:08:40dovecot_plainauthenticatorfailedfor\([80.90.138.6]\)[80.90.138.6]:57663:535Incorrectauthenticationdata\(set_id=info\)2020-07-0717:08:43dovecot_plainauthenticatorfailedfor\([109.164.5.174]\)[109.164.5.174]:33383:535Incorrectauthenticationdata\(set_id=info\)2020-07-0717:21:18dovecot_plainauthenticatorfailedfor\([191.53.251.116]\)[191.53.251.116]:47075:535Incorrectauthenticationdata\(set_id=info\)2020-07-0716:59:42dovecot_plainauthenticatorfailedfor\([94.246.169.55]\)[94.246.169.55]:51969:535Incorrectauthenticationdata\(set_id=info\)2020-07-0717:00:55dovecot_plainauthenticatorfailedfor\([186.148.80.218]\)[186.148.80.218]:48733:535Incorrectauthenticationdata\(set_id=info\)2020-07-0717:08:26dovecot_plainauthenticatorfailedfor\([143.208.139.25]\)[143.208.139.25]:35783:535Incorrectauthenticationdata\(set_id=info\)2020-07-0717:21:15dovecot_plainauthenticatorfailedfor\([179.108.240.163]\)[179.108.240.163]:44853:535Incorrectauthenticationdata\(set_id=info\)2020-07-0717:00:45dovecot_plainauthenticatorf
2020-07-08 01:47:30
165.22.102.110 attack
Jul  7 18:02:38 b-vps wordpress(gpfans.cz)[9856]: Authentication attempt for unknown user buchtic from 165.22.102.110
...
2020-07-08 01:34:44
182.185.22.220 attackbots
Automatic report - XMLRPC Attack
2020-07-08 01:11:43
45.77.149.81 attackspambots
Port scan on 1 port(s): 5060
2020-07-08 01:30:47
181.48.46.195 attackspambots
Jul  7 15:49:42 vps647732 sshd[31625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.46.195
Jul  7 15:49:44 vps647732 sshd[31625]: Failed password for invalid user git from 181.48.46.195 port 52755 ssh2
...
2020-07-08 01:29:38
185.143.73.58 attackbotsspam
Jul  7 19:13:05 websrv1.derweidener.de postfix/smtpd[363279]: warning: unknown[185.143.73.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 19:13:43 websrv1.derweidener.de postfix/smtpd[363279]: warning: unknown[185.143.73.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 19:14:22 websrv1.derweidener.de postfix/smtpd[363279]: warning: unknown[185.143.73.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 19:15:00 websrv1.derweidener.de postfix/smtpd[363279]: warning: unknown[185.143.73.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 19:15:37 websrv1.derweidener.de postfix/smtpd[363279]: warning: unknown[185.143.73.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-07-08 01:42:21
122.51.31.171 attackbotsspam
Jul  7 14:08:28 gestao sshd[4887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.31.171 
Jul  7 14:08:30 gestao sshd[4887]: Failed password for invalid user vim from 122.51.31.171 port 60832 ssh2
Jul  7 14:11:23 gestao sshd[4992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.31.171 
...
2020-07-08 01:22:41
45.125.65.52 attackbots
2020-07-07 dovecot_login authenticator failed for \(User\) \[45.125.65.52\]: 535 Incorrect authentication data \(set_id=news@**REMOVED**.**REMOVED**\)
2020-07-07 dovecot_login authenticator failed for \(User\) \[45.125.65.52\]: 535 Incorrect authentication data \(set_id=scan11\)
2020-07-07 dovecot_login authenticator failed for \(User\) \[45.125.65.52\]: 535 Incorrect authentication data \(set_id=newsletters@**REMOVED**.**REMOVED**\)
2020-07-08 01:13:52
115.64.115.250 attackbotsspam
2020-07-07T16:20:19+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-07-08 01:31:41
111.95.141.34 attackbots
SSH Bruteforce attack
2020-07-08 01:13:01
151.253.125.136 attackspambots
Jul  7 18:29:18 vm0 sshd[23134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.253.125.136
Jul  7 18:29:20 vm0 sshd[23134]: Failed password for invalid user zhiwei from 151.253.125.136 port 44342 ssh2
...
2020-07-08 01:44:29

Recently Reported IPs

45.136.153.212 45.136.153.186 45.136.153.124 45.136.153.107
45.136.153.1 45.136.153.45 45.136.153.76 45.136.153.234
45.136.153.20 45.136.153.85 45.136.153.63 45.136.153.185
45.136.153.137 45.136.153.10 45.136.153.28 45.136.153.248
45.136.153.62 45.136.153.144 45.136.153.219 45.136.153.59