Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.148.113.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36584
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.148.113.201.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121000 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 10 22:20:49 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 201.113.148.45.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 45.148.113.201.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
157.230.84.180 attackbotsspam
Sep  7 02:22:29 markkoudstaal sshd[23164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.84.180
Sep  7 02:22:32 markkoudstaal sshd[23164]: Failed password for invalid user 12345678 from 157.230.84.180 port 52486 ssh2
Sep  7 02:26:54 markkoudstaal sshd[23505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.84.180
2019-09-07 08:28:16
198.199.84.154 attackbotsspam
Automatic report - Banned IP Access
2019-09-07 08:23:38
180.168.36.86 attackspambots
Sep  6 07:40:59 auw2 sshd\[19265\]: Invalid user teamspeak from 180.168.36.86
Sep  6 07:40:59 auw2 sshd\[19265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.36.86
Sep  6 07:41:01 auw2 sshd\[19265\]: Failed password for invalid user teamspeak from 180.168.36.86 port 3422 ssh2
Sep  6 07:46:17 auw2 sshd\[19729\]: Invalid user ftpuser from 180.168.36.86
Sep  6 07:46:17 auw2 sshd\[19729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.36.86
2019-09-07 08:20:38
46.33.225.84 attack
F2B jail: sshd. Time: 2019-09-06 22:52:42, Reported by: VKReport
2019-09-07 08:23:18
93.104.181.38 attackspambots
Automatic report - Port Scan Attack
2019-09-07 08:15:08
13.59.80.228 attackspam
2019-09-06T22:46:27.394847abusebot-3.cloudsearch.cf sshd\[30014\]: Invalid user mysql from 13.59.80.228 port 33006
2019-09-07 08:44:44
107.170.113.190 attackbots
F2B jail: sshd. Time: 2019-09-07 02:45:56, Reported by: VKReport
2019-09-07 08:59:28
138.197.213.233 attackbotsspam
Sep  7 01:54:24 heissa sshd\[9045\]: Invalid user admin from 138.197.213.233 port 47338
Sep  7 01:54:24 heissa sshd\[9045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.213.233
Sep  7 01:54:27 heissa sshd\[9045\]: Failed password for invalid user admin from 138.197.213.233 port 47338 ssh2
Sep  7 01:58:31 heissa sshd\[9453\]: Invalid user ts3srv from 138.197.213.233 port 54230
Sep  7 01:58:31 heissa sshd\[9453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.213.233
2019-09-07 08:40:13
139.59.59.194 attackbots
Sep  6 14:41:18 lcdev sshd\[16710\]: Invalid user postgres from 139.59.59.194
Sep  6 14:41:18 lcdev sshd\[16710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.194
Sep  6 14:41:20 lcdev sshd\[16710\]: Failed password for invalid user postgres from 139.59.59.194 port 36346 ssh2
Sep  6 14:46:02 lcdev sshd\[17117\]: Invalid user cssserver from 139.59.59.194
Sep  6 14:46:02 lcdev sshd\[17117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.194
2019-09-07 08:48:04
81.118.52.78 attack
Sep  7 00:41:51 game-panel sshd[13100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.118.52.78
Sep  7 00:41:54 game-panel sshd[13100]: Failed password for invalid user web from 81.118.52.78 port 33828 ssh2
Sep  7 00:45:54 game-panel sshd[13230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.118.52.78
2019-09-07 08:59:43
149.129.175.132 attack
Sep  6 19:47:39 eola sshd[31001]: Invalid user myftp from 149.129.175.132 port 34760
Sep  6 19:47:39 eola sshd[31001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.175.132 
Sep  6 19:47:40 eola sshd[31001]: Failed password for invalid user myftp from 149.129.175.132 port 34760 ssh2
Sep  6 19:47:41 eola sshd[31001]: Received disconnect from 149.129.175.132 port 34760:11: Bye Bye [preauth]
Sep  6 19:47:41 eola sshd[31001]: Disconnected from 149.129.175.132 port 34760 [preauth]
Sep  6 19:58:12 eola sshd[31143]: Invalid user user1 from 149.129.175.132 port 49548
Sep  6 19:58:12 eola sshd[31143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.175.132 
Sep  6 19:58:14 eola sshd[31143]: Failed password for invalid user user1 from 149.129.175.132 port 49548 ssh2
Sep  6 19:58:15 eola sshd[31143]: Received disconnect from 149.129.175.132 port 49548:11: Bye Bye [preauth]
Sep  6 19:5........
-------------------------------
2019-09-07 08:46:17
93.62.253.232 attack
" "
2019-09-07 08:10:01
147.135.163.102 attack
Sep  6 05:18:54 sachi sshd\[28784\]: Invalid user teamspeak from 147.135.163.102
Sep  6 05:18:54 sachi sshd\[28784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip102.ip-147-135-163.eu
Sep  6 05:18:56 sachi sshd\[28784\]: Failed password for invalid user teamspeak from 147.135.163.102 port 54668 ssh2
Sep  6 05:23:05 sachi sshd\[29133\]: Invalid user ts3srv from 147.135.163.102
Sep  6 05:23:05 sachi sshd\[29133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip102.ip-147-135-163.eu
2019-09-07 08:26:15
106.75.210.147 attackbots
Sep  7 01:41:17 bouncer sshd\[16620\]: Invalid user hadoop from 106.75.210.147 port 57564
Sep  7 01:41:17 bouncer sshd\[16620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.210.147 
Sep  7 01:41:19 bouncer sshd\[16620\]: Failed password for invalid user hadoop from 106.75.210.147 port 57564 ssh2
...
2019-09-07 08:27:07
61.147.57.47 attackbotsspam
Triggered by Fail2Ban at Vostok web server
2019-09-07 08:32:44

Recently Reported IPs

79.121.187.254 163.119.82.148 135.234.245.27 48.200.135.12
84.143.55.82 213.200.207.46 251.113.109.92 201.100.176.191
146.129.189.220 197.235.108.103 134.100.182.177 31.218.17.15
85.249.205.91 63.105.129.213 98.94.243.204 23.46.254.67
38.2.208.217 209.26.50.152 224.250.129.234 40.87.79.22