Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.138.101.207 attackspambots
pinterest spam
2020-06-14 02:07:31
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.138.101.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41735
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.138.101.221.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021100 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 11 14:49:16 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 221.101.138.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.101.138.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.65.112.93 attack
Invalid user guest from 159.65.112.93 port 34670
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.112.93
Failed password for invalid user guest from 159.65.112.93 port 34670 ssh2
Invalid user guest from 159.65.112.93 port 45672
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.112.93
2019-12-02 15:09:08
185.251.38.4 attackbots
0,20-01/30 [bc01/m59] PostRequest-Spammer scoring: maputo01_x2b
2019-12-02 14:43:23
181.110.240.194 attackbots
Dec  2 06:59:55 vps666546 sshd\[31432\]: Invalid user chanley from 181.110.240.194 port 37106
Dec  2 06:59:55 vps666546 sshd\[31432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.110.240.194
Dec  2 06:59:57 vps666546 sshd\[31432\]: Failed password for invalid user chanley from 181.110.240.194 port 37106 ssh2
Dec  2 07:07:08 vps666546 sshd\[31764\]: Invalid user ssssss from 181.110.240.194 port 49876
Dec  2 07:07:08 vps666546 sshd\[31764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.110.240.194
...
2019-12-02 14:28:30
185.176.27.170 attack
Dec  2 05:26:16 mail kernel: [6640882.821955] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.170 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=18862 PROTO=TCP SPT=45121 DPT=60559 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec  2 05:27:20 mail kernel: [6640947.463348] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.170 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=44450 PROTO=TCP SPT=45121 DPT=63197 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec  2 05:28:48 mail kernel: [6641035.327826] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.170 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=40199 PROTO=TCP SPT=45121 DPT=32039 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec  2 05:29:49 mail kernel: [6641096.077919] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.170 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=17756 PROTO=TCP SPT=45121 DPT=24182 WINDOW=1024 RES=0
2019-12-02 14:24:51
192.99.151.33 attack
SSH bruteforce
2019-12-02 14:42:19
202.182.104.58 attackspambots
REQUESTED PAGE: ///wp-login.php
2019-12-02 15:04:50
31.27.38.242 attackspam
Dec  2 07:30:15 [host] sshd[28214]: Invalid user cyri from 31.27.38.242
Dec  2 07:30:15 [host] sshd[28214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.27.38.242
Dec  2 07:30:17 [host] sshd[28214]: Failed password for invalid user cyri from 31.27.38.242 port 38318 ssh2
2019-12-02 14:55:52
212.64.40.35 attack
Dec  2 08:30:03 sauna sshd[176599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.40.35
Dec  2 08:30:05 sauna sshd[176599]: Failed password for invalid user orazio from 212.64.40.35 port 49626 ssh2
...
2019-12-02 15:04:28
81.22.45.95 attack
2019-12-02T07:21:34.576186+01:00 lumpi kernel: [557653.654440] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.95 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=25556 PROTO=TCP SPT=45155 DPT=3485 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-12-02 14:27:28
128.199.240.120 attack
Dec  2 06:38:32 vmanager6029 sshd\[12955\]: Invalid user pw from 128.199.240.120 port 58944
Dec  2 06:38:32 vmanager6029 sshd\[12955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.240.120
Dec  2 06:38:34 vmanager6029 sshd\[12955\]: Failed password for invalid user pw from 128.199.240.120 port 58944 ssh2
2019-12-02 14:25:23
128.199.218.137 attack
Dec  2 09:31:01 hosting sshd[26116]: Invalid user wolfe from 128.199.218.137 port 45954
...
2019-12-02 14:46:10
222.186.175.163 attackspambots
Dec  2 07:51:47 vps666546 sshd\[1597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163  user=root
Dec  2 07:51:48 vps666546 sshd\[1597\]: Failed password for root from 222.186.175.163 port 3342 ssh2
Dec  2 07:51:52 vps666546 sshd\[1597\]: Failed password for root from 222.186.175.163 port 3342 ssh2
Dec  2 07:51:55 vps666546 sshd\[1597\]: Failed password for root from 222.186.175.163 port 3342 ssh2
Dec  2 07:52:00 vps666546 sshd\[1597\]: Failed password for root from 222.186.175.163 port 3342 ssh2
...
2019-12-02 14:57:16
36.105.213.11 attack
UTC: 2019-12-01 port: 22/tcp
2019-12-02 14:26:31
183.87.157.202 attackspam
Dec  2 09:19:46 server sshd\[19966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.87.157.202  user=root
Dec  2 09:19:48 server sshd\[19966\]: Failed password for root from 183.87.157.202 port 59230 ssh2
Dec  2 09:30:38 server sshd\[23941\]: Invalid user rpm from 183.87.157.202
Dec  2 09:30:38 server sshd\[23941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.87.157.202 
Dec  2 09:30:40 server sshd\[23941\]: Failed password for invalid user rpm from 183.87.157.202 port 57326 ssh2
...
2019-12-02 14:43:51
200.116.226.180 attack
Unauthorised access (Dec  2) SRC=200.116.226.180 LEN=52 TTL=113 ID=7918 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-02 14:29:06

Recently Reported IPs

45.140.207.150 45.140.205.161 45.138.103.124 45.140.207.16
45.142.115.31 45.145.128.129 45.140.206.201 45.145.128.156
45.138.101.59 45.145.128.18 45.143.200.118 45.145.128.88
45.145.129.211 45.145.128.122 45.145.129.100 45.145.129.153
45.145.128.152 45.145.128.51 45.145.129.45 45.145.129.250