Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lagos

Region: Lagos

Country: Nigeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.192.0.0 - 45.222.255.255
CIDR:           45.220.0.0/15, 45.208.0.0/13, 45.222.0.0/16, 45.192.0.0/12, 45.216.0.0/14
NetName:        AFRINIC
NetHandle:      NET-45-192-0-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Transferred to AfriNIC
OriginAS:       
Organization:   African Network Information Center (AFRINIC)
RegDate:        2014-05-22
Updated:        2015-02-26
Ref:            https://rdap.arin.net/registry/ip/45.192.0.0

ResourceLink:  http://afrinic.net/en/services/whois-query
ResourceLink:  whois.afrinic.net


OrgName:        African Network Information Center
OrgId:          AFRINIC
Address:        Level 11ABC
Address:        Raffles Tower
Address:        Lot 19, Cybercity
City:           Ebene
StateProv:      
PostalCode:     
Country:        MU
RegDate:        2004-05-17
Updated:        2015-05-04
Comment:        AfriNIC - http://www.afrinic.net
Comment:        The African & Indian Ocean Internet Registry
Ref:            https://rdap.arin.net/registry/entity/AFRINIC

ReferralServer:  whois://whois.afrinic.net
ResourceLink:  http://afrinic.net/en/services/whois-query

OrgAbuseHandle: GENER11-ARIN
OrgAbuseName:   Generic POC
OrgAbusePhone:  +230 4666616 
OrgAbuseEmail:  abusepoc@afrinic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GENER11-ARIN

OrgTechHandle: GENER11-ARIN
OrgTechName:   Generic POC
OrgTechPhone:  +230 4666616 
OrgTechEmail:  abusepoc@afrinic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GENER11-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.afrinic.net.

% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '45.199.224.0 - 45.199.224.255'

% No abuse contact registered for 45.199.224.0 - 45.199.224.255

inetnum:        45.199.224.0 - 45.199.224.255
netname:        IT_HOST_BLSYNC
descr:          IT_HOST_BLSYNC
country:        NG
admin-c:        CIS1-AFRINIC
tech-c:         CIS1-AFRINIC
status:         ASSIGNED PA
remarks:        Geofeed https://blsync.com/geo/subnets.csv
remarks:        Geofeed: https://blsync.com/geo/subnets.csv
mnt-by:         CIL1-MNT
mnt-by:         LARUS-SERVICE-MNT
source:         AFRINIC # Filtered
parent:         45.192.0.0 - 45.207.255.255

person:         Cloud Innovation Support
address:        Ebene
address:        MU
address:        Mahe
address:        Seychelles
phone:          tel:+248-4-610-795
nic-hdl:        CIS1-AFRINIC
abuse-mailbox:  abuse@cloudinnovation.org
mnt-by:         CIL1-MNT
source:         AFRINIC # Filtered

% Information related to '45.199.224.0/24AS202656'

route:          45.199.224.0/24
descr:          IT_HOST_BLSYNC
origin:         AS202656
mnt-by:         LARUS-SERVICE-MNT
source:         AFRINIC # Filtered
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.199.224.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54223
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.199.224.63.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040601 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 01:39:26 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 63.224.199.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 63.224.199.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.230.110.11 attackbotsspam
Aug 20 05:42:21 Ubuntu-1404-trusty-64-minimal sshd\[14378\]: Invalid user ftpuser from 157.230.110.11
Aug 20 05:42:21 Ubuntu-1404-trusty-64-minimal sshd\[14378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.110.11
Aug 20 05:42:23 Ubuntu-1404-trusty-64-minimal sshd\[14378\]: Failed password for invalid user ftpuser from 157.230.110.11 port 53190 ssh2
Aug 20 14:06:41 Ubuntu-1404-trusty-64-minimal sshd\[27847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.110.11  user=root
Aug 20 14:06:43 Ubuntu-1404-trusty-64-minimal sshd\[27847\]: Failed password for root from 157.230.110.11 port 34734 ssh2
2019-08-20 20:09:46
61.39.74.69 attackspam
Invalid user nagios from 61.39.74.69 port 50246
2019-08-20 20:24:36
167.99.200.84 attack
2019-08-20T12:06:36.206434abusebot-6.cloudsearch.cf sshd\[8071\]: Invalid user cyrus from 167.99.200.84 port 33532
2019-08-20 20:08:09
40.73.78.233 attack
Aug 20 01:39:08 web1 sshd\[24149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.78.233  user=root
Aug 20 01:39:10 web1 sshd\[24149\]: Failed password for root from 40.73.78.233 port 2560 ssh2
Aug 20 01:43:06 web1 sshd\[24572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.78.233  user=root
Aug 20 01:43:08 web1 sshd\[24572\]: Failed password for root from 40.73.78.233 port 2560 ssh2
Aug 20 01:47:05 web1 sshd\[24979\]: Invalid user jboss from 40.73.78.233
Aug 20 01:47:05 web1 sshd\[24979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.78.233
2019-08-20 20:27:08
165.22.179.42 attack
Aug 20 05:59:40 shared07 sshd[778]: Invalid user oracle10g from 165.22.179.42
Aug 20 05:59:40 shared07 sshd[778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.179.42
Aug 20 05:59:42 shared07 sshd[778]: Failed password for invalid user oracle10g from 165.22.179.42 port 50984 ssh2
Aug 20 05:59:42 shared07 sshd[778]: Received disconnect from 165.22.179.42 port 50984:11: Bye Bye [preauth]
Aug 20 05:59:42 shared07 sshd[778]: Disconnected from 165.22.179.42 port 50984 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=165.22.179.42
2019-08-20 20:08:48
185.143.221.60 attackspam
Aug 20 10:09:54 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.221.60 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=3238 PROTO=TCP SPT=51763 DPT=15039 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-08-20 20:03:15
59.37.33.202 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-20 10:38:49,231 INFO [amun_request_handler] PortScan Detected on Port: 3389 (59.37.33.202)
2019-08-20 20:25:38
94.191.47.240 attackspam
Aug 19 22:33:33 lcdev sshd\[19994\]: Invalid user randall from 94.191.47.240
Aug 19 22:33:33 lcdev sshd\[19994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.47.240
Aug 19 22:33:35 lcdev sshd\[19994\]: Failed password for invalid user randall from 94.191.47.240 port 36567 ssh2
Aug 19 22:39:28 lcdev sshd\[20727\]: Invalid user jenkins from 94.191.47.240
Aug 19 22:39:28 lcdev sshd\[20727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.47.240
2019-08-20 20:19:09
185.36.81.166 attackspam
Rude login attack (10 tries in 1d)
2019-08-20 20:03:57
189.10.195.130 attack
Aug 20 12:53:48 mail1 sshd\[30945\]: Invalid user kbm from 189.10.195.130 port 45528
Aug 20 12:53:48 mail1 sshd\[30945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.10.195.130
Aug 20 12:53:50 mail1 sshd\[30945\]: Failed password for invalid user kbm from 189.10.195.130 port 45528 ssh2
Aug 20 13:07:22 mail1 sshd\[5066\]: Invalid user ryana from 189.10.195.130 port 39616
Aug 20 13:07:22 mail1 sshd\[5066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.10.195.130
...
2019-08-20 20:01:30
139.59.68.135 attackspambots
Aug 20 01:32:05 wbs sshd\[16269\]: Invalid user admin from 139.59.68.135
Aug 20 01:32:05 wbs sshd\[16269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.68.135
Aug 20 01:32:07 wbs sshd\[16269\]: Failed password for invalid user admin from 139.59.68.135 port 48262 ssh2
Aug 20 01:36:54 wbs sshd\[16693\]: Invalid user julian from 139.59.68.135
Aug 20 01:36:54 wbs sshd\[16693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.68.135
2019-08-20 19:50:31
219.128.21.29 attackbotsspam
Aug 20 06:05:05 * sshd[18554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.128.21.29
Aug 20 06:05:07 * sshd[18554]: Failed password for invalid user admin from 219.128.21.29 port 57498 ssh2
2019-08-20 19:46:34
103.232.120.109 attackbots
Aug 19 23:14:45 hiderm sshd\[31356\]: Invalid user wallimo_phpbb1 from 103.232.120.109
Aug 19 23:14:45 hiderm sshd\[31356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.232.120.109
Aug 19 23:14:46 hiderm sshd\[31356\]: Failed password for invalid user wallimo_phpbb1 from 103.232.120.109 port 60144 ssh2
Aug 19 23:20:39 hiderm sshd\[31851\]: Invalid user open from 103.232.120.109
Aug 19 23:20:39 hiderm sshd\[31851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.232.120.109
2019-08-20 20:17:09
180.167.141.51 attack
Aug 19 23:39:21 web9 sshd\[26507\]: Invalid user appltest from 180.167.141.51
Aug 19 23:39:21 web9 sshd\[26507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.141.51
Aug 19 23:39:23 web9 sshd\[26507\]: Failed password for invalid user appltest from 180.167.141.51 port 51384 ssh2
Aug 19 23:43:58 web9 sshd\[27487\]: Invalid user usuario2 from 180.167.141.51
Aug 19 23:43:58 web9 sshd\[27487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.141.51
2019-08-20 20:06:15
31.166.130.33 attack
1433/tcp 1433/tcp 445/tcp
[2019-08-20]3pkt
2019-08-20 19:45:37

Recently Reported IPs

35.233.40.58 211.188.60.100 122.192.203.142 2606:4700:10::6814:4427
2606:4700:10::6816:3647 2606:4700:10::ac43:2416 2606:4700:10::6814:5873 2606:4700:10::6814:9684
18.217.98.22 16.54.11.149 106.1.90.236 66.132.172.129
24.89.82.52 164.68.109.118 110.77.226.109 2606:4700:10::6816:4437
2606:4700:10::ac43:2616 2606:4700:10::6816:4841 110.78.150.146 2606:4700:10::6816:3142