Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.196.187.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61566
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.196.187.1.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090100 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 02 01:50:04 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 1.187.196.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.187.196.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.15.84.255 attackspam
Invalid user postgres from 51.15.84.255 port 60230
2020-10-01 14:34:10
177.12.227.131 attackbotsspam
Invalid user lingan from 177.12.227.131 port 28109
2020-10-01 13:58:24
178.254.171.84 attackbotsspam
Invalid user admin from 178.254.171.84 port 49435
2020-10-01 13:52:55
116.196.105.232 attack
Port scan denied
2020-10-01 14:18:50
67.207.94.180 attackbots
$f2bV_matches
2020-10-01 14:31:00
104.248.124.109 attackbotsspam
104.248.124.109 - - [30/Sep/2020:21:40:06 +0100] "POST /wp-login.php HTTP/1.1" 200 2673 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.124.109 - - [30/Sep/2020:21:40:10 +0100] "POST /wp-login.php HTTP/1.1" 200 2656 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.124.109 - - [30/Sep/2020:21:40:21 +0100] "POST /wp-login.php HTTP/1.1" 200 2639 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-01 14:08:47
154.126.107.132 attackspambots
Unauthorized access to SSH at 30/Sep/2020:20:40:22 +0000.
2020-10-01 14:06:54
196.52.43.104 attackbots
Port scanning [2 denied]
2020-10-01 14:02:14
62.234.17.74 attackbots
SSH Brute-force
2020-10-01 13:55:01
168.63.72.135 attackspambots
Brute forcing email accounts
2020-10-01 14:17:25
222.186.42.155 attack
2020-10-01T07:58:57.366021centos sshd[8950]: Failed password for root from 222.186.42.155 port 15685 ssh2
2020-10-01T07:59:01.104038centos sshd[8950]: Failed password for root from 222.186.42.155 port 15685 ssh2
2020-10-01T07:59:04.607037centos sshd[8950]: Failed password for root from 222.186.42.155 port 15685 ssh2
...
2020-10-01 14:00:19
106.54.155.35 attackspambots
SSH-BruteForce
2020-10-01 14:03:53
119.45.54.166 attackbotsspam
Oct  1 02:17:32 rocket sshd[24460]: Failed password for root from 119.45.54.166 port 59982 ssh2
Oct  1 02:22:25 rocket sshd[25092]: Failed password for root from 119.45.54.166 port 55574 ssh2
...
2020-10-01 14:31:49
128.90.182.123 attack
Oct  1 02:47:05 vps46666688 sshd[2946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.90.182.123
Oct  1 02:47:07 vps46666688 sshd[2946]: Failed password for invalid user support from 128.90.182.123 port 61162 ssh2
...
2020-10-01 13:53:44
157.230.14.146 attackbotsspam
firewall-block, port(s): 8682/tcp, 59808/tcp
2020-10-01 14:11:41

Recently Reported IPs

39.61.86.38 79.140.29.116 215.107.14.80 112.85.42.73
116.114.93.243 63.255.5.5 139.59.46.226 175.107.48.193
144.194.1.116 103.36.122.146 125.227.64.128 189.167.38.223
179.238.173.43 74.14.219.4 9.112.100.74 94.209.123.179
74.120.14.35 85.96.233.75 114.101.116.110 216.45.35.154