Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: DXTL Tseung Kwan O Service

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.192.72.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38100
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.192.72.221.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 20:55:25 CST 2019
;; MSG SIZE  rcvd: 117

Host info
Host 221.72.192.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 221.72.192.45.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
190.29.166.226 attackbotsspam
Jul  4 08:19:58 jumpserver sshd[335656]: Invalid user sasaki from 190.29.166.226 port 40912
Jul  4 08:20:00 jumpserver sshd[335656]: Failed password for invalid user sasaki from 190.29.166.226 port 40912 ssh2
Jul  4 08:23:40 jumpserver sshd[335663]: Invalid user ftpuser from 190.29.166.226 port 37628
...
2020-07-04 19:20:42
82.65.27.68 attackspambots
Jul  4 13:29:05 jane sshd[14659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.65.27.68 
Jul  4 13:29:07 jane sshd[14659]: Failed password for invalid user svn from 82.65.27.68 port 47554 ssh2
...
2020-07-04 19:59:53
14.187.39.87 attackspambots
Cluster member 67.227.229.95 (US/United States/saathoff.geek) said, DENY 14.187.39.87, Reason:[(sshd) Failed SSH login from 14.187.39.87 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs]; Ports: *; Direction: inout; Trigger: LF_CLUSTER
2020-07-04 19:46:00
93.85.82.148 attackspambots
$f2bV_matches
2020-07-04 19:56:38
39.99.220.7 attackbotsspam
[H1] Blocked by UFW
2020-07-04 19:48:30
139.219.12.62 attackspambots
20 attempts against mh-ssh on echoip
2020-07-04 20:03:22
218.92.0.168 attackbotsspam
Jul  4 13:25:46 pve1 sshd[17540]: Failed password for root from 218.92.0.168 port 47487 ssh2
Jul  4 13:25:50 pve1 sshd[17540]: Failed password for root from 218.92.0.168 port 47487 ssh2
...
2020-07-04 19:32:44
161.35.32.43 attack
Auto Fail2Ban report, multiple SSH login attempts.
2020-07-04 20:04:51
222.186.180.130 attackbotsspam
Unauthorized connection attempt detected from IP address 222.186.180.130 to port 22
2020-07-04 20:00:38
192.241.225.107 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-07-04 19:59:12
181.50.99.8 attackspam
DATE:2020-07-04 09:17:19, IP:181.50.99.8, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-07-04 19:22:12
88.214.26.90 attackbots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-04T08:57:34Z and 2020-07-04T10:36:56Z
2020-07-04 19:25:23
23.130.192.151 attack
Invalid user subhana from 23.130.192.151 port 54639
2020-07-04 19:51:46
212.70.149.18 attackspambots
2020-07-04 13:12:32 dovecot_login authenticator failed for \(User\) \[212.70.149.18\]: 535 Incorrect authentication data \(set_id=xid@no-server.de\)
2020-07-04 13:12:43 dovecot_login authenticator failed for \(User\) \[212.70.149.18\]: 535 Incorrect authentication data \(set_id=xid@no-server.de\)
2020-07-04 13:12:56 dovecot_login authenticator failed for \(User\) \[212.70.149.18\]: 535 Incorrect authentication data \(set_id=xenon@no-server.de\)
2020-07-04 13:13:08 dovecot_login authenticator failed for \(User\) \[212.70.149.18\]: 535 Incorrect authentication data \(set_id=xenon@no-server.de\)
2020-07-04 13:13:21 dovecot_login authenticator failed for \(User\) \[212.70.149.18\]: 535 Incorrect authentication data \(set_id=xenon@no-server.de\)
2020-07-04 13:13:25 dovecot_login authenticator failed for \(User\) \[212.70.149.18\]: 535 Incorrect authentication data \(set_id=xenon@no-server.de\)
...
2020-07-04 19:19:26
218.92.0.133 attackspambots
Jul 4 13:35:54 *host* sshd\[18862\]: Unable to negotiate with 218.92.0.133 port 9502: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\]
2020-07-04 19:42:13

Recently Reported IPs

182.38.110.37 189.232.142.117 173.178.231.197 104.244.73.23
94.226.78.162 114.236.46.243 177.129.221.78 153.245.154.119
74.208.250.16 100.36.9.183 51.14.66.68 14.170.113.75
109.213.22.81 187.1.183.107 4.140.51.119 59.46.136.54
193.121.126.205 54.230.6.94 190.131.254.234 185.216.158.138