Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hong Kong

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.142.154.115
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56316
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.142.154.115.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025091400 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 14 22:30:20 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 115.154.142.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 115.154.142.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.138.225 attackspam
Feb  9 08:08:53 server sshd\[8791\]: Invalid user fye from 106.13.138.225
Feb  9 08:08:53 server sshd\[8791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.138.225 
Feb  9 08:08:55 server sshd\[8791\]: Failed password for invalid user fye from 106.13.138.225 port 35050 ssh2
Feb  9 08:17:44 server sshd\[10346\]: Invalid user iiz from 106.13.138.225
Feb  9 08:17:44 server sshd\[10346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.138.225 
...
2020-02-09 15:14:17
93.103.19.231 attackspam
Feb  8 21:00:19 auw2 sshd\[29279\]: Invalid user isy from 93.103.19.231
Feb  8 21:00:19 auw2 sshd\[29279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93-103-19-231.static.t-2.net
Feb  8 21:00:21 auw2 sshd\[29279\]: Failed password for invalid user isy from 93.103.19.231 port 58830 ssh2
Feb  8 21:03:19 auw2 sshd\[29575\]: Invalid user lfn from 93.103.19.231
Feb  8 21:03:19 auw2 sshd\[29575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93-103-19-231.static.t-2.net
2020-02-09 15:32:34
187.9.61.218 attack
20/2/8@23:55:27: FAIL: Alarm-Network address from=187.9.61.218
20/2/8@23:55:27: FAIL: Alarm-Network address from=187.9.61.218
...
2020-02-09 15:33:20
68.183.19.84 attackbotsspam
Feb  9 06:30:19 prox sshd[30381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.84 
Feb  9 06:30:21 prox sshd[30381]: Failed password for invalid user uzy from 68.183.19.84 port 58642 ssh2
2020-02-09 15:28:11
54.148.226.208 attackspambots
02/09/2020-07:44:31.077814 54.148.226.208 Protocol: 6 SURICATA TLS invalid record/traffic
2020-02-09 15:19:30
35.175.106.191 attack
Feb  9 10:25:57 areeb-Workstation sshd[3455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.175.106.191 
Feb  9 10:25:58 areeb-Workstation sshd[3455]: Failed password for invalid user pdx from 35.175.106.191 port 47236 ssh2
...
2020-02-09 15:01:44
89.248.162.136 attack
Feb  9 08:14:23 debian-2gb-nbg1-2 kernel: \[3491701.495938\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.162.136 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=27378 PROTO=TCP SPT=58241 DPT=2978 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-09 15:23:43
94.102.49.102 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 94 - port: 22 proto: TCP cat: Misc Attack
2020-02-09 14:56:28
139.162.75.99 attack
unauthorized connection attempt
2020-02-09 15:38:23
101.231.201.50 attack
$f2bV_matches
2020-02-09 14:54:35
122.52.48.92 attack
Feb  9 07:06:36 markkoudstaal sshd[18096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.52.48.92
Feb  9 07:06:38 markkoudstaal sshd[18096]: Failed password for invalid user iut from 122.52.48.92 port 51031 ssh2
Feb  9 07:11:17 markkoudstaal sshd[18921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.52.48.92
2020-02-09 15:05:55
103.84.202.200 attackspam
20/2/8@23:55:51: FAIL: Alarm-Network address from=103.84.202.200
...
2020-02-09 15:15:53
185.232.67.5 attackbotsspam
Feb  9 07:58:17 dedicated sshd[11280]: Invalid user admin from 185.232.67.5 port 56162
2020-02-09 15:29:02
199.195.251.227 attackspam
Feb  9 12:09:39 gw1 sshd[24529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.251.227
Feb  9 12:09:41 gw1 sshd[24529]: Failed password for invalid user cek from 199.195.251.227 port 33838 ssh2
...
2020-02-09 15:31:41
148.70.183.43 attackbotsspam
Feb  9 06:59:44 silence02 sshd[707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.183.43
Feb  9 06:59:47 silence02 sshd[707]: Failed password for invalid user cio from 148.70.183.43 port 34053 ssh2
Feb  9 07:04:07 silence02 sshd[1044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.183.43
2020-02-09 14:55:29

Recently Reported IPs

14.212.61.114 45.88.186.32 4.99.4.21 35.212.214.197
23.204.80.143 2.16.62.73 185.247.137.71 38.93.202.208
103.6.79.83 2.196.6.221 123.98.37.159 116.198.139.4
213.209.157.117 20.163.13.222 2001:16b8:64d4:1100:c00b:b3fa:30b6:d6d5 113.215.188.191
137.184.164.57 196.251.84.253 117.205.92.43 22.36.10.20