Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Seychelles

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.199.132.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25173
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.199.132.219.			IN	A

;; AUTHORITY SECTION:
.			65	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 01:46:50 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 219.132.199.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.132.199.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
134.90.149.150 attack
Port scan detected on ports: 8080[TCP], 5836[TCP], 3121[TCP]
2020-08-05 00:08:34
188.166.144.207 attackbots
Aug  4 10:12:38 master sshd[18956]: Failed password for root from 188.166.144.207 port 58672 ssh2
Aug  4 10:19:50 master sshd[19083]: Failed password for root from 188.166.144.207 port 42860 ssh2
Aug  4 10:24:46 master sshd[19222]: Failed password for root from 188.166.144.207 port 53986 ssh2
Aug  4 10:29:26 master sshd[19319]: Failed password for root from 188.166.144.207 port 36882 ssh2
Aug  4 10:33:47 master sshd[19794]: Failed password for root from 188.166.144.207 port 48006 ssh2
Aug  4 10:38:02 master sshd[19883]: Failed password for root from 188.166.144.207 port 59132 ssh2
Aug  4 10:42:11 master sshd[20046]: Failed password for root from 188.166.144.207 port 42026 ssh2
Aug  4 10:46:29 master sshd[20146]: Failed password for root from 188.166.144.207 port 53150 ssh2
Aug  4 10:50:57 master sshd[20276]: Failed password for root from 188.166.144.207 port 36042 ssh2
Aug  4 10:55:15 master sshd[20366]: Failed password for root from 188.166.144.207 port 47166 ssh2
2020-08-04 23:58:02
113.161.57.16 attackbotsspam
20/8/4@05:21:23: FAIL: Alarm-Network address from=113.161.57.16
...
2020-08-04 23:51:53
178.62.234.124 attack
Brute-force attempt banned
2020-08-04 23:25:42
51.68.199.188 attackspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-04T10:46:28Z and 2020-08-04T10:54:52Z
2020-08-04 23:46:41
148.229.3.242 attack
Aug  4 23:40:09 localhost sshd[3474027]: Connection closed by 148.229.3.242 port 34914 [preauth]
...
2020-08-04 23:41:50
203.106.41.10 attackspam
Aug  4 14:05:41 vps647732 sshd[14882]: Failed password for root from 203.106.41.10 port 43832 ssh2
...
2020-08-04 23:28:46
181.209.242.27 attack
Aug  4 11:11:05 servernet sshd[5353]: Invalid user admin from 181.209.242.27
Aug  4 11:11:05 servernet sshd[5353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.209.242.27 
Aug  4 11:11:07 servernet sshd[5353]: Failed password for invalid user admin from 181.209.242.27 port 36284 ssh2
Aug  4 11:11:08 servernet sshd[5355]: Invalid user admin from 181.209.242.27

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=181.209.242.27
2020-08-05 00:00:02
47.107.231.92 attackspambots
Aug  4 18:59:18 our-server-hostname sshd[15208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.107.231.92  user=r.r
Aug  4 18:59:20 our-server-hostname sshd[15208]: Failed password for r.r from 47.107.231.92 port 52340 ssh2
Aug  4 19:02:21 our-server-hostname sshd[15901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.107.231.92  user=r.r
Aug  4 19:02:22 our-server-hostname sshd[15901]: Failed password for r.r from 47.107.231.92 port 47376 ssh2
Aug  4 19:04:00 our-server-hostname sshd[16281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.107.231.92  user=r.r
Aug  4 19:04:02 our-server-hostname sshd[16281]: Failed password for r.r from 47.107.231.92 port 34236 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=47.107.231.92
2020-08-04 23:44:20
210.56.23.100 attackspambots
Aug  4 12:33:55 vps647732 sshd[12654]: Failed password for root from 210.56.23.100 port 35706 ssh2
...
2020-08-04 23:20:45
106.13.13.188 attackbotsspam
Aug  4 13:24:58 ip40 sshd[2303]: Failed password for root from 106.13.13.188 port 40800 ssh2
...
2020-08-04 23:18:13
121.183.203.60 attackspam
Aug  4 15:21:30 jumpserver sshd[14756]: Failed password for root from 121.183.203.60 port 38162 ssh2
Aug  4 15:23:57 jumpserver sshd[14803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.183.203.60  user=root
Aug  4 15:23:59 jumpserver sshd[14803]: Failed password for root from 121.183.203.60 port 46438 ssh2
...
2020-08-04 23:54:22
159.89.2.220 attack
159.89.2.220 - - [04/Aug/2020:13:21:05 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.89.2.220 - - [04/Aug/2020:13:21:05 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.89.2.220 - - [04/Aug/2020:13:21:06 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-04 23:58:30
216.15.95.36 attackbotsspam
Aug  4 09:05:55 XXX sshd[14618]: Invalid user admin from 216.15.95.36
Aug  4 09:05:56 XXX sshd[14618]: Received disconnect from 216.15.95.36: 11: Bye Bye [preauth]
Aug  4 09:05:56 XXX sshd[14620]: Invalid user admin from 216.15.95.36
Aug  4 09:05:57 XXX sshd[14620]: Received disconnect from 216.15.95.36: 11: Bye Bye [preauth]
Aug  4 09:05:57 XXX sshd[14622]: Invalid user admin from 216.15.95.36
Aug  4 09:05:58 XXX sshd[14622]: Received disconnect from 216.15.95.36: 11: Bye Bye [preauth]
Aug  4 09:05:58 XXX sshd[14624]: Invalid user admin from 216.15.95.36
Aug  4 09:05:59 XXX sshd[14624]: Received disconnect from 216.15.95.36: 11: Bye Bye [preauth]
Aug  4 09:05:59 XXX sshd[14626]: Invalid user admin from 216.15.95.36
Aug  4 09:06:00 XXX sshd[14626]: Received disconnect from 216.15.95.36: 11: Bye Bye [preauth]
Aug  4 09:06:01 XXX sshd[14628]: Invalid user admin from 216.15.95.36
Aug  4 09:06:01 XXX sshd[14628]: Received disconnect from 216.15.95.36: 11: Bye Bye [preauth]
........
-------------------------------
2020-08-04 23:24:39
210.19.35.122 attackbotsspam
08/04/2020-05:21:19.024668 210.19.35.122 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-08-04 23:57:27

Recently Reported IPs

85.25.93.136 175.160.60.202 154.201.46.58 58.11.32.248
187.176.63.122 81.214.249.210 138.204.203.21 183.217.49.84
117.195.139.7 46.237.20.221 175.41.46.94 110.78.28.170
45.66.209.216 156.217.203.8 179.106.56.201 117.218.207.230
122.116.149.204 191.240.24.171 14.102.53.121 45.169.44.183