Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.145.64.165 attack
Microsoft-Windows-Security-Auditing
2020-09-11 02:15:19
45.145.64.165 attackbots
Microsoft-Windows-Security-Auditing
2020-09-10 17:39:10
45.145.64.165 attack
Microsoft-Windows-Security-Auditing
2020-09-10 08:12:12
45.145.64.102 attack
21 attempts against mh_ha-misbehave-ban on lb
2020-07-10 15:15:48
45.145.64.102 attackspambots
SQL Injection Attempts
2020-07-09 03:47:20
45.145.64.100 attackbots
Blocked for SQL Injection in query string: term=flat-fee
2020-07-07 23:52:08
45.145.64.101 attack
22 attempts against mh_ha-misbehave-ban on beach
2020-07-07 07:12:51
45.145.64.100 attackspambots
block
2020-07-01 21:03:41
45.145.64.101 attackbots
23 attempts against mh_ha-misbehave-ban on sun
2020-06-30 02:40:47
45.145.64.100 attack
20 attempts against mh-misbehave-ban on ray
2020-06-28 12:29:19
45.145.64.101 attackspambots
23 attempts against mh-misbehave-ban on tree
2020-06-25 13:53:00
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.145.64.202
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.145.64.202.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 16:22:49 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 202.64.145.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 202.64.145.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
63.240.240.74 attackspam
Oct 10 07:40:52 vpn01 sshd[18782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.240.240.74
Oct 10 07:40:54 vpn01 sshd[18782]: Failed password for invalid user tester from 63.240.240.74 port 41288 ssh2
...
2020-10-10 13:57:10
212.70.149.52 attack
Oct 10 07:41:39 mail postfix/smtpd\[21467\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 10 08:11:53 mail postfix/smtpd\[22564\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 10 08:12:19 mail postfix/smtpd\[22440\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 10 08:12:44 mail postfix/smtpd\[22566\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-10-10 14:11:37
222.186.30.76 attackbots
Oct 10 07:57:09 abendstille sshd\[3396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Oct 10 07:57:11 abendstille sshd\[3396\]: Failed password for root from 222.186.30.76 port 12527 ssh2
Oct 10 07:57:14 abendstille sshd\[3396\]: Failed password for root from 222.186.30.76 port 12527 ssh2
Oct 10 07:57:16 abendstille sshd\[3396\]: Failed password for root from 222.186.30.76 port 12527 ssh2
Oct 10 07:57:20 abendstille sshd\[3596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
...
2020-10-10 13:59:19
203.98.96.180 attack
Too many connection attempt to nonexisting ports
2020-10-10 07:52:58
198.245.60.211 attackspam
CMS (WordPress or Joomla) login attempt.
2020-10-10 07:54:30
121.58.222.125 attackbots
Unauthorized connection attempt from IP address 121.58.222.125 on Port 445(SMB)
2020-10-10 07:50:18
61.177.172.89 attackspam
"fail2ban match"
2020-10-10 07:55:12
149.56.44.101 attack
Automatic report - Banned IP Access
2020-10-10 07:59:50
5.89.35.84 attack
Fail2Ban Ban Triggered
2020-10-10 14:02:47
189.8.24.218 attackbotsspam
Unauthorized connection attempt from IP address 189.8.24.218 on Port 445(SMB)
2020-10-10 07:51:14
111.229.218.60 attackbotsspam
"Unauthorized connection attempt on SSHD detected"
2020-10-10 07:56:37
201.193.198.70 attackspambots
1602276541 - 10/09/2020 22:49:01 Host: 201.193.198.70/201.193.198.70 Port: 445 TCP Blocked
...
2020-10-10 14:07:30
138.117.177.82 attackspambots
SSH login attempts.
2020-10-10 14:04:45
200.169.6.206 attackspambots
Oct 8 02:03:34 *hidden* sshd[19302]: Failed password for *hidden* from 200.169.6.206 port 46503 ssh2 Oct 8 02:07:32 *hidden* sshd[21213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.169.6.206 user=root Oct 8 02:07:35 *hidden* sshd[21213]: Failed password for *hidden* from 200.169.6.206 port 44412 ssh2
2020-10-10 07:59:19
112.85.42.187 attackbotsspam
2020-10-09 17:56:19.849814-0500  localhost sshd[35345]: Failed password for root from 112.85.42.187 port 25689 ssh2
2020-10-10 08:02:41

Recently Reported IPs

124.192.135.203 117.206.253.119 92.102.12.6 81.97.219.253
39.180.207.45 249.115.75.188 252.169.104.134 143.27.32.206
242.65.223.183 225.162.148.208 94.144.152.220 165.143.156.104
85.87.100.157 33.219.88.148 54.146.173.140 39.92.105.185
129.32.43.100 249.194.237.246 60.237.79.92 97.207.248.250