Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.200.152.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11270
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.200.152.2.			IN	A

;; AUTHORITY SECTION:
.			580	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101800 1800 900 604800 86400

;; Query time: 115 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 19 02:47:44 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 2.152.200.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.152.200.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
92.47.7.67 attackspam
Automatic report - Port Scan Attack
2019-11-27 16:29:45
62.172.168.60 attack
Nov 27 06:29:18 hermescis postfix/smtpd\[10417\]: NOQUEUE: reject: RCPT from unknown\[62.172.168.60\]: 550 5.1.1 \: Recipient address rejected:* from=\ to=\ proto=ESMTP helo=\<\[62.172.168.60\]\>
2019-11-27 16:40:16
1.10.238.246 attackspam
Unauthorized connection attempt from IP address 1.10.238.246 on Port 445(SMB)
2019-11-27 16:22:20
123.31.29.203 attackbotsspam
Nov 27 07:30:34 vps647732 sshd[24297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.29.203
Nov 27 07:30:36 vps647732 sshd[24297]: Failed password for invalid user rhona from 123.31.29.203 port 53886 ssh2
...
2019-11-27 16:09:11
149.202.56.194 attack
Nov 26 21:53:59 tdfoods sshd\[2399\]: Invalid user bac from 149.202.56.194
Nov 26 21:53:59 tdfoods sshd\[2399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.ip-149-202-56.eu
Nov 26 21:54:01 tdfoods sshd\[2399\]: Failed password for invalid user bac from 149.202.56.194 port 44902 ssh2
Nov 26 22:00:05 tdfoods sshd\[2861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.ip-149-202-56.eu  user=mysql
Nov 26 22:00:07 tdfoods sshd\[2861\]: Failed password for mysql from 149.202.56.194 port 52126 ssh2
2019-11-27 16:07:03
106.52.19.218 attackbotsspam
Nov 27 04:05:03 hostnameis sshd[23781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.19.218  user=r.r
Nov 27 04:05:05 hostnameis sshd[23781]: Failed password for r.r from 106.52.19.218 port 49808 ssh2
Nov 27 04:05:05 hostnameis sshd[23781]: Received disconnect from 106.52.19.218: 11: Bye Bye [preauth]
Nov 27 04:23:33 hostnameis sshd[23939]: Invalid user cnidc from 106.52.19.218
Nov 27 04:23:33 hostnameis sshd[23939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.19.218 
Nov 27 04:23:35 hostnameis sshd[23939]: Failed password for invalid user cnidc from 106.52.19.218 port 56182 ssh2
Nov 27 04:23:35 hostnameis sshd[23939]: Received disconnect from 106.52.19.218: 11: Bye Bye [preauth]
Nov 27 04:30:32 hostnameis sshd[23994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.19.218  user=r.r
Nov 27 04:30:34 hostnameis sshd[23994]: Fai........
------------------------------
2019-11-27 16:37:30
112.85.42.179 attack
Nov 27 09:09:04 mail sshd[15655]: Failed password for root from 112.85.42.179 port 53190 ssh2
Nov 27 09:09:08 mail sshd[15655]: Failed password for root from 112.85.42.179 port 53190 ssh2
Nov 27 09:09:11 mail sshd[15655]: Failed password for root from 112.85.42.179 port 53190 ssh2
Nov 27 09:09:15 mail sshd[15655]: Failed password for root from 112.85.42.179 port 53190 ssh2
2019-11-27 16:37:09
5.188.84.35 attackbotsspam
2019-11-27 06:30:49 UTC | HarekPaugs | anatoliy.khalaimov@m | http://explorempls.com/explore-more/buy-imitrex-25-mg-fast-delivery/ | 5.188.84.35 | Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36 OPR/54.0.2952.64 (Edition Yx) | Anecdotal reports of increase in liability following treatment with pseudoephedrine or other over-the-counter chilling preparations may be partially explained by this mechanism, however, no dosing recommendations are readily obtainable. It means distinguishing unequivocally between fetching up these issues in a factious and in a medical fashion. This switch was symbolised before the reversal in the BMA business in its 1993 turn up on ‘complementary medicine’ women's heal |
2019-11-27 16:19:38
218.92.0.137 attackspam
Nov 27 09:25:22 fr01 sshd[11280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.137  user=root
Nov 27 09:25:24 fr01 sshd[11280]: Failed password for root from 218.92.0.137 port 40381 ssh2
...
2019-11-27 16:31:16
218.104.234.173 attack
Nov 27 07:29:58 ns3042688 courier-imapd: LOGIN FAILED, method=PLAIN, ip=\[::ffff:218.104.234.173\]
...
2019-11-27 16:22:38
112.133.229.90 attack
Unauthorised access (Nov 27) SRC=112.133.229.90 LEN=52 TTL=107 ID=2942 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 25) SRC=112.133.229.90 LEN=52 TTL=110 ID=22747 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-27 16:42:12
49.88.112.58 attackspam
$f2bV_matches
2019-11-27 16:35:18
182.71.209.203 attackbots
Automatic report - Banned IP Access
2019-11-27 16:26:49
125.77.30.71 attack
Nov 27 07:11:01 cw sshd[17309]: User r.r from 125.77.30.71 not allowed because listed in DenyUsers
Nov 27 07:11:23 cw sshd[17317]: User r.r from 125.77.30.71 not allowed because listed in DenyUsers
Nov 27 07:11:46 cw sshd[17509]: User r.r from 125.77.30.71 not allowed because listed in DenyUsers
Nov 27 07:11:51 cw sshd[17511]: User r.r from 125.77.30.71 not allowed because listed in DenyUsers
Nov 27 07:11:59 cw sshd[17514]: User r.r from 125.77.30.71 not allowed because listed in DenyUsers
Nov 27 07:12:14 cw sshd[17520]: User r.r from 125.77.30.71 not allowed because listed in DenyUsers


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=125.77.30.71
2019-11-27 16:08:33
139.219.7.243 attackspambots
Nov 27 04:32:22 firewall sshd[12004]: Invalid user marchetto from 139.219.7.243
Nov 27 04:32:24 firewall sshd[12004]: Failed password for invalid user marchetto from 139.219.7.243 port 34000 ssh2
Nov 27 04:40:13 firewall sshd[12154]: Invalid user miquel from 139.219.7.243
...
2019-11-27 16:07:55

Recently Reported IPs

151.74.38.32 130.128.166.51 149.62.156.118 67.43.201.24
65.19.94.244 79.152.53.115 189.57.119.80 219.143.196.133
182.151.42.174 81.2.156.209 146.66.15.86 108.145.233.161
81.84.76.173 157.37.7.179 34.94.233.80 146.244.98.185
116.167.29.97 190.188.104.147 69.31.142.219 77.195.120.105