Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.139.114.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7063
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.139.114.161.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 06:05:48 CST 2025
;; MSG SIZE  rcvd: 107
Host info
161.114.139.45.in-addr.arpa domain name pointer 45.139.114.161.mc-host24.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
161.114.139.45.in-addr.arpa	name = 45.139.114.161.mc-host24.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
36.235.114.115 attackspambots
Unauthorized connection attempt detected from IP address 36.235.114.115 to port 445
2019-12-15 05:12:27
106.12.87.250 attackbots
Dec 14 17:10:03 *** sshd[3839]: Failed password for invalid user operator from 106.12.87.250 port 45254 ssh2
Dec 14 17:17:32 *** sshd[3956]: Failed password for invalid user buy from 106.12.87.250 port 42174 ssh2
Dec 14 17:25:42 *** sshd[4158]: Failed password for invalid user dbus from 106.12.87.250 port 39058 ssh2
Dec 14 17:32:43 *** sshd[4263]: Failed password for invalid user rpc from 106.12.87.250 port 36046 ssh2
Dec 14 17:39:23 *** sshd[4420]: Failed password for invalid user server from 106.12.87.250 port 33094 ssh2
Dec 14 17:47:38 *** sshd[4622]: Failed password for invalid user guss from 106.12.87.250 port 58262 ssh2
Dec 14 17:57:14 *** sshd[4772]: Failed password for invalid user student02 from 106.12.87.250 port 55252 ssh2
Dec 14 18:05:20 *** sshd[4977]: Failed password for invalid user ltenti from 106.12.87.250 port 52156 ssh2
Dec 14 18:12:30 *** sshd[5155]: Failed password for invalid user admin from 106.12.87.250 port 49182 ssh2
Dec 14 18:19:43 *** sshd[5274]: Failed password for invalid user jo
2019-12-15 05:07:06
168.243.91.19 attackspambots
$f2bV_matches
2019-12-15 05:38:06
120.196.144.242 attackbots
IMAP
2019-12-15 05:23:58
91.215.244.12 attackbotsspam
Dec 14 16:24:23 [host] sshd[26826]: Invalid user 123456 from 91.215.244.12
Dec 14 16:24:23 [host] sshd[26826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.215.244.12
Dec 14 16:24:26 [host] sshd[26826]: Failed password for invalid user 123456 from 91.215.244.12 port 56369 ssh2
2019-12-15 05:31:56
91.77.61.21 attackbotsspam
Unauthorised access (Dec 14) SRC=91.77.61.21 LEN=52 TTL=114 ID=24587 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-15 05:19:20
159.203.201.114 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-15 05:25:26
128.199.233.188 attack
Dec 14 17:29:16 [host] sshd[29732]: Invalid user castleman from 128.199.233.188
Dec 14 17:29:16 [host] sshd[29732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.233.188
Dec 14 17:29:18 [host] sshd[29732]: Failed password for invalid user castleman from 128.199.233.188 port 50450 ssh2
2019-12-15 05:34:53
88.98.232.53 attackspambots
Dec 14 22:38:07 hosting sshd[14291]: Invalid user host from 88.98.232.53 port 36779
...
2019-12-15 05:07:28
141.101.69.167 attack
IP blocked
2019-12-15 05:14:38
111.26.79.4 attackspambots
firewall-block, port(s): 60001/tcp
2019-12-15 05:31:28
103.126.172.6 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-12-15 05:05:34
51.75.170.116 attack
$f2bV_matches
2019-12-15 05:35:33
106.249.25.137 attackbots
fail2ban honeypot
2019-12-15 05:01:48
183.99.59.177 attackspam
Dec 14 22:19:06 gw1 sshd[4788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.99.59.177
Dec 14 22:19:07 gw1 sshd[4788]: Failed password for invalid user test from 183.99.59.177 port 56098 ssh2
...
2019-12-15 05:02:45

Recently Reported IPs

30.218.36.80 114.90.142.83 202.26.24.73 96.30.190.94
59.253.129.62 71.137.215.3 104.24.213.74 208.120.63.248
40.67.12.12 197.20.97.24 181.46.132.4 184.179.72.247
252.230.82.234 28.142.237.34 24.106.187.108 161.169.95.16
51.251.137.221 154.137.2.213 172.185.91.177 82.181.165.168