Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Madrid

Region: Madrid

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.145.134.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48679
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.145.134.211.			IN	A

;; AUTHORITY SECTION:
.			351	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090200 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 02 23:58:34 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 211.134.145.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 211.134.145.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.33.78 attackspam
Invalid user bravo from 106.12.33.78 port 34486
2020-05-15 14:19:26
95.91.74.120 attack
20 attempts against mh-misbehave-ban on twig
2020-05-15 14:21:08
134.209.164.184 attackspam
May 14 23:42:17 server1 sshd\[14528\]: Failed password for invalid user posp from 134.209.164.184 port 39906 ssh2
May 14 23:47:15 server1 sshd\[16077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.164.184  user=root
May 14 23:47:18 server1 sshd\[16077\]: Failed password for root from 134.209.164.184 port 43684 ssh2
May 14 23:52:07 server1 sshd\[17542\]: Invalid user qing from 134.209.164.184
May 14 23:52:07 server1 sshd\[17542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.164.184 
...
2020-05-15 14:34:45
114.67.74.91 attackspambots
(sshd) Failed SSH login from 114.67.74.91 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 15 06:41:37 srv sshd[15308]: Invalid user sai from 114.67.74.91 port 33670
May 15 06:41:39 srv sshd[15308]: Failed password for invalid user sai from 114.67.74.91 port 33670 ssh2
May 15 06:50:44 srv sshd[15571]: Invalid user corina from 114.67.74.91 port 44838
May 15 06:50:46 srv sshd[15571]: Failed password for invalid user corina from 114.67.74.91 port 44838 ssh2
May 15 06:54:40 srv sshd[15660]: Invalid user jobs from 114.67.74.91 port 38380
2020-05-15 14:46:36
51.178.78.152 attackspam
TCP port 5432: Scan and connection
2020-05-15 14:35:34
138.197.222.141 attack
ssh brute force
2020-05-15 14:26:53
192.34.57.27 attackspam
May 15 03:10:08 dns1 sshd[31365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.34.57.27 
May 15 03:10:09 dns1 sshd[31365]: Failed password for invalid user alberico from 192.34.57.27 port 46397 ssh2
May 15 03:18:08 dns1 sshd[31722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.34.57.27
2020-05-15 14:28:32
103.140.2.42 attack
Port scan detected on ports: 8291[TCP], 8291[TCP], 8728[TCP]
2020-05-15 14:39:49
175.36.183.218 attackbotsspam
2020-05-15T06:57:41.773404rocketchat.forhosting.nl sshd[1216]: Invalid user charles from 175.36.183.218 port 37262
2020-05-15T06:57:44.141556rocketchat.forhosting.nl sshd[1216]: Failed password for invalid user charles from 175.36.183.218 port 37262 ssh2
2020-05-15T07:01:41.520979rocketchat.forhosting.nl sshd[1338]: Invalid user testftp from 175.36.183.218 port 33620
...
2020-05-15 14:40:49
178.128.15.57 attack
sshd jail - ssh hack attempt
2020-05-15 14:19:04
89.248.168.221 attackspambots
May 15 03:53:18   TCP Attack: SRC=89.248.168.221 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=246  PROTO=TCP SPT=46000 DPT=44816 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-15 14:19:52
2.3.74.213 attack
SSH brute-force attempt
2020-05-15 14:27:30
167.99.66.158 attackbots
2020-05-15T08:06:31.769570rocketchat.forhosting.nl sshd[2095]: Invalid user oracle from 167.99.66.158 port 48508
2020-05-15T08:06:34.114109rocketchat.forhosting.nl sshd[2095]: Failed password for invalid user oracle from 167.99.66.158 port 48508 ssh2
2020-05-15T08:11:03.351111rocketchat.forhosting.nl sshd[2153]: Invalid user osboxes from 167.99.66.158 port 57598
...
2020-05-15 14:35:12
87.251.74.196 attack
May 15 07:38:23 debian-2gb-nbg1-2 kernel: \[11779953.629265\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.196 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=61080 PROTO=TCP SPT=48997 DPT=10961 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-15 14:30:58
172.86.75.107 attack
" "
2020-05-15 15:01:39

Recently Reported IPs

91.32.212.228 12.248.55.228 85.187.133.80 163.121.15.9
158.95.198.186 145.98.173.215 115.181.109.122 205.246.79.14
141.117.0.99 143.197.99.130 183.78.15.159 61.113.120.193
147.143.154.92 71.244.176.253 191.101.118.207 35.166.108.0
53.147.157.163 99.45.221.171 18.201.148.229 174.68.94.4