Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.172.68.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15451
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.172.68.1.			IN	A

;; AUTHORITY SECTION:
.			477	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 23:41:23 CST 2022
;; MSG SIZE  rcvd: 104
Host info
b'1.68.172.45.in-addr.arpa domain name pointer 45-172-68-1.n-multimidia.com.br.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.68.172.45.in-addr.arpa	name = 45-172-68-1.liderfibra.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.162.95.236 attack
20/2/4@01:46:08: FAIL: Alarm-Network address from=125.162.95.236
20/2/4@01:46:08: FAIL: Alarm-Network address from=125.162.95.236
...
2020-02-04 21:29:34
193.112.16.245 attackbots
Unauthorized connection attempt detected from IP address 193.112.16.245 to port 2220 [J]
2020-02-04 21:16:38
179.214.194.140 attackspambots
Unauthorized connection attempt detected from IP address 179.214.194.140 to port 2220 [J]
2020-02-04 21:08:40
182.16.249.130 attack
Feb  4 13:47:55 tuxlinux sshd[17893]: Invalid user ftpuser from 182.16.249.130 port 6770
Feb  4 13:47:55 tuxlinux sshd[17893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.249.130 
Feb  4 13:47:55 tuxlinux sshd[17893]: Invalid user ftpuser from 182.16.249.130 port 6770
Feb  4 13:47:55 tuxlinux sshd[17893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.249.130 
Feb  4 13:47:55 tuxlinux sshd[17893]: Invalid user ftpuser from 182.16.249.130 port 6770
Feb  4 13:47:55 tuxlinux sshd[17893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.249.130 
Feb  4 13:47:57 tuxlinux sshd[17893]: Failed password for invalid user ftpuser from 182.16.249.130 port 6770 ssh2
...
2020-02-04 21:08:11
185.176.27.26 attack
scans 4 times in preceeding hours on the ports (in chronological order) 65333 10444 10999 12111 resulting in total of 258 scans from 185.176.27.0/24 block.
2020-02-04 21:06:09
71.6.158.166 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 68 - port: 8083 proto: TCP cat: Misc Attack
2020-02-04 20:41:32
51.83.75.56 attackspambots
Unauthorized connection attempt detected from IP address 51.83.75.56 to port 2220 [J]
2020-02-04 20:50:19
81.84.159.115 attackbots
Feb  4 05:53:05 grey postfix/smtpd\[28639\]: NOQUEUE: reject: RCPT from a81-84-159-115.cpe.netcabo.pt\[81.84.159.115\]: 554 5.7.1 Service unavailable\; Client host \[81.84.159.115\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?81.84.159.115\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-04 21:09:59
78.128.113.132 attack
2020-02-04 14:05:33 dovecot_login authenticator failed for \(\[78.128.113.132\]\) \[78.128.113.132\]: 535 Incorrect authentication data \(set_id=adm1n@no-server.de\)
2020-02-04 14:05:40 dovecot_login authenticator failed for \(\[78.128.113.132\]\) \[78.128.113.132\]: 535 Incorrect authentication data \(set_id=adm1n\)
2020-02-04 14:07:33 dovecot_login authenticator failed for \(\[78.128.113.132\]\) \[78.128.113.132\]: 535 Incorrect authentication data \(set_id=adminadmin@no-server.de\)
2020-02-04 14:07:40 dovecot_login authenticator failed for \(\[78.128.113.132\]\) \[78.128.113.132\]: 535 Incorrect authentication data \(set_id=adminadmin\)
2020-02-04 14:09:03 dovecot_login authenticator failed for \(\[78.128.113.132\]\) \[78.128.113.132\]: 535 Incorrect authentication data \(set_id=craze@no-server.de\)
...
2020-02-04 21:11:34
200.105.111.129 attack
Feb  4 07:32:55 grey postfix/smtpd\[14058\]: NOQUEUE: reject: RCPT from unknown\[200.105.111.129\]: 554 5.7.1 Service unavailable\; Client host \[200.105.111.129\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[200.105.111.129\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-04 21:04:50
134.175.206.12 attack
Automatic report - SSH Brute-Force Attack
2020-02-04 21:09:05
167.99.252.35 attackbots
Unauthorized connection attempt detected from IP address 167.99.252.35 to port 2220 [J]
2020-02-04 20:40:37
195.189.96.135 attackspambots
Unauthorized connection attempt detected from IP address 195.189.96.135 to port 5900
2020-02-04 21:00:02
222.239.78.88 attackspambots
Feb  4 14:11:16 mail sshd\[2776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.239.78.88  user=root
Feb  4 14:11:18 mail sshd\[2776\]: Failed password for root from 222.239.78.88 port 34689 ssh2
Feb  4 14:13:26 mail sshd\[2891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.239.78.88  user=root
2020-02-04 21:31:08
218.92.0.212 attackspambots
SSH login attempts
2020-02-04 21:16:21

Recently Reported IPs

182.116.114.156 138.199.27.6 183.250.126.89 39.77.216.151
5.187.43.220 59.94.207.8 120.244.131.243 171.14.45.99
185.221.147.101 1.159.174.132 113.173.12.252 58.11.158.203
35.234.62.26 109.236.51.7 92.252.230.76 46.39.228.190
111.18.213.1 93.33.255.127 81.214.187.80 91.248.216.146