Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: MacroLAN

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.203.25.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27706
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.203.25.136.			IN	A

;; AUTHORITY SECTION:
.			3343	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060800 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 09 01:36:41 CST 2019
;; MSG SIZE  rcvd: 117

Host info
Host 136.25.203.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 136.25.203.45.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
45.10.115.191 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-27 01:51:52
188.31.140.24 attackbotsspam
hostname admin hacker/bb fake/l	ukon
Domain Extension	net
Top-Level Domain (TLD)	.net
TLD Type	Generic Top-Level Domain (gTLD)
Sponsoring Organisation	VeriSign Global Registry Services
WHOIS Server	whois.verisign-grs.com
Registry URL	http://www.verisigninc.com
 famous 45 ref hackers/issues with other countries still ken/block awstats.org/w3.org.tr hacking developers with race and control issues -anyone can be ISP/ owner/dev/programmer any NS native speaker hacking/expected based on neighbour previous solicitor involvement - male with issues
2019-08-27 01:01:08
106.12.12.172 attack
Aug 26 04:30:36 aiointranet sshd\[16977\]: Invalid user may from 106.12.12.172
Aug 26 04:30:36 aiointranet sshd\[16977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.12.172
Aug 26 04:30:38 aiointranet sshd\[16977\]: Failed password for invalid user may from 106.12.12.172 port 51084 ssh2
Aug 26 04:34:15 aiointranet sshd\[17249\]: Invalid user TeamSpeak from 106.12.12.172
Aug 26 04:34:15 aiointranet sshd\[17249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.12.172
2019-08-27 01:02:12
91.217.60.125 attack
Unauthorized connection attempt from IP address 91.217.60.125 on Port 445(SMB)
2019-08-27 01:53:18
46.17.45.124 attackspam
Aug 26 06:35:34 kapalua sshd\[17807\]: Invalid user icp from 46.17.45.124
Aug 26 06:35:34 kapalua sshd\[17807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.17.45.124
Aug 26 06:35:36 kapalua sshd\[17807\]: Failed password for invalid user icp from 46.17.45.124 port 56122 ssh2
Aug 26 06:39:49 kapalua sshd\[18291\]: Invalid user sam from 46.17.45.124
Aug 26 06:39:49 kapalua sshd\[18291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.17.45.124
2019-08-27 01:12:12
52.164.205.238 attackbotsspam
Aug 26 15:31:20 OPSO sshd\[17910\]: Invalid user yuri from 52.164.205.238 port 56470
Aug 26 15:31:20 OPSO sshd\[17910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.164.205.238
Aug 26 15:31:22 OPSO sshd\[17910\]: Failed password for invalid user yuri from 52.164.205.238 port 56470 ssh2
Aug 26 15:35:47 OPSO sshd\[18706\]: Invalid user mailman from 52.164.205.238 port 46022
Aug 26 15:35:47 OPSO sshd\[18706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.164.205.238
2019-08-27 01:20:46
79.101.223.239 attackspam
Unauthorized connection attempt from IP address 79.101.223.239 on Port 445(SMB)
2019-08-27 01:15:47
153.36.236.35 attackspambots
Automated report - ssh fail2ban:
Aug 26 18:50:18 wrong password, user=root, port=35639, ssh2
Aug 26 18:50:22 wrong password, user=root, port=35639, ssh2
Aug 26 18:50:26 wrong password, user=root, port=35639, ssh2
2019-08-27 00:57:18
177.43.76.36 attackspambots
Aug 26 11:31:37 xtremcommunity sshd\[5269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.43.76.36  user=root
Aug 26 11:31:39 xtremcommunity sshd\[5269\]: Failed password for root from 177.43.76.36 port 58143 ssh2
Aug 26 11:38:48 xtremcommunity sshd\[5638\]: Invalid user hadoop from 177.43.76.36 port 52436
Aug 26 11:38:48 xtremcommunity sshd\[5638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.43.76.36
Aug 26 11:38:51 xtremcommunity sshd\[5638\]: Failed password for invalid user hadoop from 177.43.76.36 port 52436 ssh2
...
2019-08-27 00:55:22
42.115.76.156 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-27 01:11:36
148.70.71.137 attack
Aug 26 18:58:07 nextcloud sshd\[4724\]: Invalid user hxhtftp from 148.70.71.137
Aug 26 18:58:07 nextcloud sshd\[4724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.71.137
Aug 26 18:58:09 nextcloud sshd\[4724\]: Failed password for invalid user hxhtftp from 148.70.71.137 port 55862 ssh2
...
2019-08-27 01:00:09
220.126.227.74 attackspam
Aug 26 14:14:42 vtv3 sshd\[3569\]: Invalid user bot from 220.126.227.74 port 35656
Aug 26 14:14:42 vtv3 sshd\[3569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.126.227.74
Aug 26 14:14:44 vtv3 sshd\[3569\]: Failed password for invalid user bot from 220.126.227.74 port 35656 ssh2
Aug 26 14:19:34 vtv3 sshd\[6022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.126.227.74  user=root
Aug 26 14:19:36 vtv3 sshd\[6022\]: Failed password for root from 220.126.227.74 port 52328 ssh2
Aug 26 14:33:47 vtv3 sshd\[13769\]: Invalid user demo from 220.126.227.74 port 45864
Aug 26 14:33:47 vtv3 sshd\[13769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.126.227.74
Aug 26 14:33:50 vtv3 sshd\[13769\]: Failed password for invalid user demo from 220.126.227.74 port 45864 ssh2
Aug 26 14:38:46 vtv3 sshd\[16410\]: Invalid user apotre from 220.126.227.74 port 34304
Aug 26 14:38:46 vtv3
2019-08-27 01:42:03
168.232.80.139 attack
Unauthorized connection attempt from IP address 168.232.80.139 on Port 445(SMB)
2019-08-27 01:55:12
23.129.64.189 attackspambots
GET posting.php
2019-08-27 01:08:54
190.196.147.180 attackspam
Unauthorized connection attempt from IP address 190.196.147.180 on Port 445(SMB)
2019-08-27 01:02:44

Recently Reported IPs

46.171.214.125 123.213.206.226 196.84.190.0 104.248.137.178
135.30.180.11 101.64.29.70 45.238.138.130 112.168.78.171
78.249.62.199 17.112.45.28 85.93.129.247 23.254.46.120
190.229.171.17 143.17.217.25 119.1.92.30 114.236.46.249
78.30.43.125 111.255.205.186 92.62.237.228 71.92.246.236