Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.138.74.165 attackbotsspam
Lines containing failures of 45.138.74.165
Sep 27 05:41:31 nbi-636 postfix/smtpd[19199]: warning: hostname 19639.vm.hostglobal.ws does not resolve to address 45.138.74.165
Sep 27 05:41:31 nbi-636 postfix/smtpd[19199]: connect from unknown[45.138.74.165]
Sep x@x
Sep 27 05:41:31 nbi-636 postfix/smtpd[19199]: disconnect from unknown[45.138.74.165] ehlo=1 mail=1 rcpt=0/1 quhostname=1 commands=3/4
Übereinsservermungen in Binärdatei /var/log/apache/pucorp.org.log


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.138.74.165
2020-09-30 09:56:53
45.138.74.165 attackbots
Lines containing failures of 45.138.74.165
Sep 27 05:41:31 nbi-636 postfix/smtpd[19199]: warning: hostname 19639.vm.hostglobal.ws does not resolve to address 45.138.74.165
Sep 27 05:41:31 nbi-636 postfix/smtpd[19199]: connect from unknown[45.138.74.165]
Sep x@x
Sep 27 05:41:31 nbi-636 postfix/smtpd[19199]: disconnect from unknown[45.138.74.165] ehlo=1 mail=1 rcpt=0/1 quhostname=1 commands=3/4
Übereinsservermungen in Binärdatei /var/log/apache/pucorp.org.log


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.138.74.165
2020-09-30 02:50:16
45.138.74.165 attack
Lines containing failures of 45.138.74.165
Sep 27 05:41:31 nbi-636 postfix/smtpd[19199]: warning: hostname 19639.vm.hostglobal.ws does not resolve to address 45.138.74.165
Sep 27 05:41:31 nbi-636 postfix/smtpd[19199]: connect from unknown[45.138.74.165]
Sep x@x
Sep 27 05:41:31 nbi-636 postfix/smtpd[19199]: disconnect from unknown[45.138.74.165] ehlo=1 mail=1 rcpt=0/1 quhostname=1 commands=3/4
Übereinsservermungen in Binärdatei /var/log/apache/pucorp.org.log


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.138.74.165
2020-09-29 18:52:41
45.138.74.116 attack
E-Mail Spam (RBL) [REJECTED]
2020-09-20 20:44:54
45.138.74.116 attackspambots
E-Mail Spam (RBL) [REJECTED]
2020-09-20 12:39:56
45.138.74.116 attackbotsspam
E-Mail Spam (RBL) [REJECTED]
2020-09-20 04:39:57
45.138.74.32 attackspam
From: "UltraMax Testosterone Enhancer" <0UNSmQ@ziggo.nl>
Subject: Lausige Erektionen? Nie wieder!
Date: Thu, 17 Sep 2020 05:48:56 +0200
2020-09-20 01:40:00
45.138.74.77 attackspambots
From: "Crypto Software" <AGxEiP@upc.at>
Subject: Wie man sich Cash verdienen!
Date: Thu, 17 Sep 2020 05:09:01 +0200
2020-09-19 22:20:46
45.138.74.32 attack
From: "UltraMax Testosterone Enhancer" <0UNSmQ@ziggo.nl>
Subject: Lausige Erektionen? Nie wieder!
Date: Thu, 17 Sep 2020 05:48:56 +0200
2020-09-19 17:29:50
45.138.74.77 attackbotsspam
From: "Crypto Software" <AGxEiP@upc.at>
Subject: Wie man sich Cash verdienen!
Date: Thu, 17 Sep 2020 05:09:01 +0200
2020-09-19 14:12:16
45.138.74.77 attackspam
From: "Crypto Software" <AGxEiP@upc.at>
Subject: Wie man sich Cash verdienen!
Date: Thu, 17 Sep 2020 05:09:01 +0200
2020-09-19 05:50:02
45.138.74.211 attack
SpamScore above: 10.0
2020-08-11 20:26:12
45.138.74.165 attackbots
Email spam "Glückwunsch W-E-B.D-E Nutzer!"
2020-07-21 06:45:10
45.138.74.234 spambotsattack
attack on 2020-07-13

Return-Path: 
Received: from [217.72.192.66] ([217.72.192.66]) by mx.emig.kundenserver.de
 (mxeue109 [217.72.192.66]) with ESMTP (Nemesis) id 1MoP2E-1kfC6z37ua-00omtL
 for ; Mon, 13 Jul 2020 23:15:13 +0200
Received: from reallities.com ([45.138.74.234]) by mx.emig.kundenserver.de
 (mxeue109 [217.72.192.66]) with ESMTP (Nemesis) id 1M2e9h-1jsbUM358Z-00484e
 for ; Mon, 13 Jul 2020 23:15:13 +0200
Received: from thing.nutrimment.nl () by mx.emig.kundenserver.de (mxeue110 ) with ESMTP (Nemesis) id 1MeBpR-1kTyvO0IHX-00bLGO for ; Mon, 13 Jul 2020 11:23:53 +0200
Date: Tue, 31 Dec 2105 23:59:59 +0100
From: Ohne Aufwand [Portal für Clevere] 
To: lilly@online.de
Message-ID: 
2020-07-14 05:51:22
45.138.74.252 spambotsattack
attack on 2020-07-13

Return-Path: 
Received: from [212.227.15.40] ([212.227.15.40]) by mx.emig.kundenserver.de
 (mxeue010 [212.227.15.40]) with ESMTP (Nemesis) id 1MNM6c-1kFO5s3TKc-00Op7C
 for ; Mon, 13 Jul 2020 22:42:54 +0200
Received: from glnz.djsfgsdjkgsdbhf.club ([45.138.74.252]) by
 mx.emig.kundenserver.de (mxeue010 [212.227.15.40]) with ESMTP (Nemesis) id
 1MMnKu-1kBVfu3Qf6-00InEy for ; Mon, 13 Jul 2020 22:42:54
 +0200
Received: from thing.nutrimment.nl () by mx.emig.kundenserver.de (mxeue110 ) with ESMTP (Nemesis) id 1MeBpR-1kTyvO0IHX-00bLGO for ; Mon, 13 Jul 2020 11:23:53 +0200
Date: Tue, 31 Dec 2105 23:59:59 +0100
From: =?UTF-8?B?R2VzdW5kaGVpdHNrdXJpZXI=?= 
To: lilly@online.de
Message-ID: 
2020-07-14 05:50:30
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.138.74.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32912
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.138.74.99.			IN	A

;; AUTHORITY SECTION:
.			368	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 13:46:40 CST 2022
;; MSG SIZE  rcvd: 105
Host info
99.74.138.45.in-addr.arpa domain name pointer rikohs1.top.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.74.138.45.in-addr.arpa	name = rikohs1.top.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
116.132.47.50 attackspambots
Invalid user xbmc from 116.132.47.50 port 56224
2020-05-28 12:01:04
114.4.227.194 attack
Invalid user ts3server from 114.4.227.194 port 51624
2020-05-28 08:17:36
182.61.149.31 attackbots
May 28 05:53:30 srv-ubuntu-dev3 sshd[45404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.149.31  user=root
May 28 05:53:32 srv-ubuntu-dev3 sshd[45404]: Failed password for root from 182.61.149.31 port 60246 ssh2
May 28 05:56:03 srv-ubuntu-dev3 sshd[45832]: Invalid user host from 182.61.149.31
May 28 05:56:03 srv-ubuntu-dev3 sshd[45832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.149.31
May 28 05:56:03 srv-ubuntu-dev3 sshd[45832]: Invalid user host from 182.61.149.31
May 28 05:56:06 srv-ubuntu-dev3 sshd[45832]: Failed password for invalid user host from 182.61.149.31 port 37580 ssh2
May 28 05:58:31 srv-ubuntu-dev3 sshd[46156]: Invalid user khuay from 182.61.149.31
May 28 05:58:31 srv-ubuntu-dev3 sshd[46156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.149.31
May 28 05:58:31 srv-ubuntu-dev3 sshd[46156]: Invalid user khuay from 182.61.14
...
2020-05-28 12:05:48
218.240.130.106 attackspambots
May 28 01:00:21 vps333114 sshd[12290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.240.130.106  user=ftp
May 28 01:00:23 vps333114 sshd[12290]: Failed password for ftp from 218.240.130.106 port 59292 ssh2
...
2020-05-28 07:58:36
109.172.150.4 attackbotsspam
Unauthorized connection attempt from IP address 109.172.150.4 on Port 445(SMB)
2020-05-28 08:07:15
61.3.193.45 attack
IP 61.3.193.45 attacked honeypot on port: 8080 at 5/28/2020 4:58:45 AM
2020-05-28 12:01:38
86.127.253.233 attack
Unauthorized connection attempt from IP address 86.127.253.233 on Port 445(SMB)
2020-05-28 08:05:05
66.249.64.71 attack
Automatic report - Banned IP Access
2020-05-28 12:15:14
195.231.69.225 attackbotsspam
Unauthorized connection attempt from IP address 195.231.69.225 on Port 3389(RDP)
2020-05-28 08:00:18
139.186.67.159 attackspambots
$f2bV_matches
2020-05-28 12:04:14
103.56.197.178 attackspambots
$f2bV_matches
2020-05-28 08:02:44
183.83.78.138 attackbotsspam
Unauthorized connection attempt from IP address 183.83.78.138 on Port 445(SMB)
2020-05-28 08:16:55
81.17.16.146 attack
Tor exit node
2020-05-28 08:05:58
181.65.164.179 attack
(sshd) Failed SSH login from 181.65.164.179 (PE/Peru/www.smartempresas.telefonica.com.pe): 5 in the last 3600 secs
2020-05-28 12:07:10
14.29.214.3 attackbotsspam
May 27 20:10:07 prod4 sshd\[7738\]: Failed password for root from 14.29.214.3 port 47243 ssh2
May 27 20:15:16 prod4 sshd\[10050\]: Invalid user management from 14.29.214.3
May 27 20:15:18 prod4 sshd\[10050\]: Failed password for invalid user management from 14.29.214.3 port 43095 ssh2
...
2020-05-28 08:16:25

Recently Reported IPs

197.61.38.28 194.127.108.221 195.154.61.140 197.63.174.212
154.113.120.42 59.187.243.14 8.140.116.128 222.119.96.224
46.80.12.220 117.182.222.98 190.217.14.182 139.59.5.135
144.76.136.18 223.90.221.160 163.204.92.56 189.169.170.30
192.177.142.10 20.203.205.178 103.91.17.195 124.41.227.74