Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chester Basin

Region: Nova Scotia

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.2.200.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22593
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.2.200.189.			IN	A

;; AUTHORITY SECTION:
.			359	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020801 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 09 11:15:34 CST 2022
;; MSG SIZE  rcvd: 105
Host info
189.200.2.45.in-addr.arpa domain name pointer cbl-45-2-200-189.yhz.frontiernetworks.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
189.200.2.45.in-addr.arpa	name = cbl-45-2-200-189.yhz.frontiernetworks.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
213.168.60.238 attack
Unauthorised access (Sep  7) SRC=213.168.60.238 LEN=52 TTL=112 ID=12730 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Sep  5) SRC=213.168.60.238 LEN=52 TTL=112 ID=22927 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-07 21:08:07
202.75.207.106 attackspam
Unauthorized connection attempt from IP address 202.75.207.106 on Port 445(SMB)
2019-09-07 21:09:06
5.39.82.197 attack
Sep  7 14:44:27 mail sshd\[13469\]: Invalid user sampserver from 5.39.82.197 port 33908
Sep  7 14:44:27 mail sshd\[13469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.82.197
Sep  7 14:44:29 mail sshd\[13469\]: Failed password for invalid user sampserver from 5.39.82.197 port 33908 ssh2
Sep  7 14:49:24 mail sshd\[13995\]: Invalid user . from 5.39.82.197 port 48166
Sep  7 14:49:24 mail sshd\[13995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.82.197
2019-09-07 21:05:19
167.114.230.252 attackbotsspam
Sep  7 15:08:08 eventyay sshd[2135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.230.252
Sep  7 15:08:10 eventyay sshd[2135]: Failed password for invalid user webtool from 167.114.230.252 port 52465 ssh2
Sep  7 15:12:38 eventyay sshd[2256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.230.252
...
2019-09-07 21:19:39
94.191.79.156 attackbots
Sep  7 14:59:23 mail sshd\[14829\]: Invalid user steam from 94.191.79.156 port 39536
Sep  7 14:59:23 mail sshd\[14829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.79.156
Sep  7 14:59:26 mail sshd\[14829\]: Failed password for invalid user steam from 94.191.79.156 port 39536 ssh2
Sep  7 15:04:44 mail sshd\[15888\]: Invalid user admin from 94.191.79.156 port 44904
Sep  7 15:04:44 mail sshd\[15888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.79.156
2019-09-07 21:05:46
60.250.164.169 attack
2019-09-07T13:04:33.635099abusebot-2.cloudsearch.cf sshd\[30473\]: Invalid user p4ssw0rd from 60.250.164.169 port 33074
2019-09-07 21:14:42
129.204.176.234 attack
Sep  7 02:09:29 auw2 sshd\[22893\]: Invalid user gituser from 129.204.176.234
Sep  7 02:09:29 auw2 sshd\[22893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.176.234
Sep  7 02:09:32 auw2 sshd\[22893\]: Failed password for invalid user gituser from 129.204.176.234 port 47034 ssh2
Sep  7 02:16:17 auw2 sshd\[23438\]: Invalid user bot from 129.204.176.234
Sep  7 02:16:17 auw2 sshd\[23438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.176.234
2019-09-07 20:24:33
192.227.136.69 attackbotsspam
Sep  7 08:44:08 TORMINT sshd\[29008\]: Invalid user kerapetse from 192.227.136.69
Sep  7 08:44:08 TORMINT sshd\[29008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.136.69
Sep  7 08:44:10 TORMINT sshd\[29008\]: Failed password for invalid user kerapetse from 192.227.136.69 port 33136 ssh2
...
2019-09-07 20:50:42
182.61.104.218 attackbots
$f2bV_matches_ltvn
2019-09-07 20:37:44
151.53.56.210 attackbots
Automatic report - Port Scan Attack
2019-09-07 20:43:16
37.49.231.130 attack
09/07/2019-09:03:02.498318 37.49.231.130 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-07 21:15:56
197.34.67.174 attack
Unauthorized connection attempt from IP address 197.34.67.174 on Port 445(SMB)
2019-09-07 21:00:24
39.61.49.210 attack
Unauthorized connection attempt from IP address 39.61.49.210 on Port 445(SMB)
2019-09-07 21:04:39
185.160.216.190 attackspam
[portscan] Port scan
2019-09-07 20:37:22
177.185.241.131 attackbots
Sep  7 15:10:53 site3 sshd\[146474\]: Invalid user weblogic123 from 177.185.241.131
Sep  7 15:10:53 site3 sshd\[146474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.185.241.131
Sep  7 15:10:55 site3 sshd\[146474\]: Failed password for invalid user weblogic123 from 177.185.241.131 port 43501 ssh2
Sep  7 15:16:30 site3 sshd\[146514\]: Invalid user hadoop from 177.185.241.131
Sep  7 15:16:30 site3 sshd\[146514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.185.241.131
...
2019-09-07 20:23:39

Recently Reported IPs

210.16.100.230 51.154.230.120 75.130.13.57 210.67.246.228
48.186.96.30 248.128.53.197 111.155.169.33 29.136.51.170
13.54.118.19 42.137.139.73 39.29.55.117 95.254.175.112
62.64.14.227 189.52.148.7 152.163.184.64 245.113.197.151
160.117.150.83 112.217.20.215 108.81.72.105 205.35.139.203