Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.172.68.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45551
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.172.68.142.			IN	A

;; AUTHORITY SECTION:
.			531	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 17:35:45 CST 2022
;; MSG SIZE  rcvd: 106
Host info
142.68.172.45.in-addr.arpa domain name pointer 45-172-68-142.n-multimidia.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.68.172.45.in-addr.arpa	name = 45-172-68-142.n-multimidia.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
37.190.61.192 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 21:51:42,982 INFO [amun_request_handler] PortScan Detected on Port: 445 (37.190.61.192)
2019-08-09 06:58:57
139.155.125.218 attackspam
Attempts to probe for or exploit a Drupal 7.67 site on url: /shell.php. Reported by the module https://www.drupal.org/project/abuseipdb.
2019-08-09 06:59:15
180.253.111.201 attack
" "
2019-08-09 07:03:06
27.221.81.138 attackspambots
Automatic report - Banned IP Access
2019-08-09 06:45:35
106.13.9.75 attack
Aug  8 18:27:17 xtremcommunity sshd\[18045\]: Invalid user labs from 106.13.9.75 port 38114
Aug  8 18:27:17 xtremcommunity sshd\[18045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.9.75
Aug  8 18:27:19 xtremcommunity sshd\[18045\]: Failed password for invalid user labs from 106.13.9.75 port 38114 ssh2
Aug  8 18:31:54 xtremcommunity sshd\[18159\]: Invalid user demo from 106.13.9.75 port 49936
Aug  8 18:31:54 xtremcommunity sshd\[18159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.9.75
...
2019-08-09 06:47:53
201.27.218.15 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 21:50:44,585 INFO [amun_request_handler] PortScan Detected on Port: 445 (201.27.218.15)
2019-08-09 07:03:33
177.85.161.134 attack
2019-08-08T23:56:14.073415centos sshd\[32112\]: Invalid user zorro from 177.85.161.134 port 38192
2019-08-08T23:56:14.077600centos sshd\[32112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.85.161.134
2019-08-08T23:56:16.056509centos sshd\[32112\]: Failed password for invalid user zorro from 177.85.161.134 port 38192 ssh2
2019-08-09 06:52:20
59.14.130.72 attack
Brute force attempt
2019-08-09 06:32:10
112.135.234.39 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 21:51:26,697 INFO [amun_request_handler] PortScan Detected on Port: 445 (112.135.234.39)
2019-08-09 07:00:50
112.6.116.170 attackspambots
Aug  9 01:12:35 site2 sshd\[28373\]: Invalid user info from 112.6.116.170Aug  9 01:12:38 site2 sshd\[28373\]: Failed password for invalid user info from 112.6.116.170 port 44882 ssh2Aug  9 01:13:55 site2 sshd\[28387\]: Invalid user password from 112.6.116.170Aug  9 01:13:57 site2 sshd\[28387\]: Failed password for invalid user password from 112.6.116.170 port 46682 ssh2Aug  9 01:15:12 site2 sshd\[28404\]: Invalid user abc@123456 from 112.6.116.170
...
2019-08-09 06:47:36
54.38.33.186 attackspam
Aug  9 00:13:49 SilenceServices sshd[15423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.33.186
Aug  9 00:13:51 SilenceServices sshd[15423]: Failed password for invalid user admin from 54.38.33.186 port 47464 ssh2
Aug  9 00:17:48 SilenceServices sshd[19803]: Failed password for root from 54.38.33.186 port 40946 ssh2
2019-08-09 06:21:36
86.120.218.108 attackbotsspam
Automatic report - Port Scan Attack
2019-08-09 06:31:39
88.218.16.217 bots
smartscanner intrusion attempt
2019-08-09 06:51:53
180.117.112.246 attackspambots
Automatic report - Port Scan Attack
2019-08-09 06:53:13
78.128.113.73 attack
Aug  8 18:03:40 web1 postfix/smtpd[16069]: warning: unknown[78.128.113.73]: SASL PLAIN authentication failed: authentication failure
...
2019-08-09 06:26:47

Recently Reported IPs

45.172.205.197 45.172.99.219 45.172.99.135 45.173.199.124
45.173.199.130 45.173.27.157 45.174.102.110 45.174.93.117
45.174.168.252 45.175.145.196 45.174.84.194 45.175.144.174
45.174.181.45 45.174.149.121 45.175.189.244 45.175.189.249
45.175.189.243 45.175.189.240 45.175.189.250 45.176.171.86