Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Manaus

Region: Amazonas

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: P H de Oliveira Santos Serviços e Comercio de Mul

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.229.140.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10299
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.229.140.7.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 16 01:28:33 +08 2019
;; MSG SIZE  rcvd: 116

Host info
Host 7.140.229.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 7.140.229.45.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
115.58.193.200 attackspambots
Brute%20Force%20SSH
2020-09-12 19:40:05
222.186.175.183 attack
Sep 12 13:47:34 markkoudstaal sshd[9978]: Failed password for root from 222.186.175.183 port 38876 ssh2
Sep 12 13:47:38 markkoudstaal sshd[9978]: Failed password for root from 222.186.175.183 port 38876 ssh2
Sep 12 13:47:41 markkoudstaal sshd[9978]: Failed password for root from 222.186.175.183 port 38876 ssh2
Sep 12 13:47:43 markkoudstaal sshd[9978]: Failed password for root from 222.186.175.183 port 38876 ssh2
...
2020-09-12 19:50:41
89.248.168.157 attackbotsspam
65476/tcp 65443/tcp 63211/tcp...
[2020-07-12/09-12]657pkt,244pt.(tcp)
2020-09-12 20:02:15
1.0.143.137 attack
Sep  7 12:33:34 mailserver sshd[6152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.0.143.137  user=r.r
Sep  7 12:33:36 mailserver sshd[6152]: Failed password for r.r from 1.0.143.137 port 39820 ssh2
Sep  7 12:33:36 mailserver sshd[6152]: Received disconnect from 1.0.143.137 port 39820:11: Bye Bye [preauth]
Sep  7 12:33:36 mailserver sshd[6152]: Disconnected from 1.0.143.137 port 39820 [preauth]
Sep  7 12:47:38 mailserver sshd[7533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.0.143.137  user=r.r
Sep  7 12:47:40 mailserver sshd[7533]: Failed password for r.r from 1.0.143.137 port 42706 ssh2
Sep  7 12:47:41 mailserver sshd[7533]: Received disconnect from 1.0.143.137 port 42706:11: Bye Bye [preauth]
Sep  7 12:47:41 mailserver sshd[7533]: Disconnected from 1.0.143.137 port 42706 [preauth]
Sep  7 13:10:04 mailserver sshd[9705]: pam_unix(sshd:auth): authentication failure; logname= uid........
-------------------------------
2020-09-12 19:55:46
185.123.164.54 attack
Sep 12 06:29:26 lanister sshd[2186]: Failed password for root from 185.123.164.54 port 33572 ssh2
Sep 12 06:33:12 lanister sshd[2285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.123.164.54  user=root
Sep 12 06:33:14 lanister sshd[2285]: Failed password for root from 185.123.164.54 port 39729 ssh2
Sep 12 06:37:03 lanister sshd[2559]: Invalid user f3 from 185.123.164.54
2020-09-12 19:34:33
147.135.133.88 attack
Bruteforce detected by fail2ban
2020-09-12 19:32:39
222.229.109.174 attackspambots
 TCP (SYN) 222.229.109.174:42934 -> port 22, len 44
2020-09-12 19:57:22
41.66.244.86 attackbotsspam
Sep 12 13:32:57 * sshd[2867]: Failed password for root from 41.66.244.86 port 51632 ssh2
2020-09-12 19:47:33
116.74.59.214 attackbots
DATE:2020-09-11 18:46:32, IP:116.74.59.214, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-12 19:51:26
88.150.240.193 attack
C1,WP GET /daisuki/wp-includes/wlwmanifest.xml
2020-09-12 19:38:19
203.95.212.41 attackbots
Sep 11 18:48:37 ncomp sshd[17130]: Invalid user aleksandr from 203.95.212.41 port 38080
Sep 11 18:48:37 ncomp sshd[17130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.95.212.41
Sep 11 18:48:37 ncomp sshd[17130]: Invalid user aleksandr from 203.95.212.41 port 38080
Sep 11 18:48:39 ncomp sshd[17130]: Failed password for invalid user aleksandr from 203.95.212.41 port 38080 ssh2
2020-09-12 19:30:38
201.174.53.148 attackspambots
Icarus honeypot on github
2020-09-12 19:36:53
189.226.99.56 attackbotsspam
1599842887 - 09/11/2020 18:48:07 Host: 189.226.99.56/189.226.99.56 Port: 445 TCP Blocked
2020-09-12 19:45:07
62.112.11.8 attackspambots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-12T10:03:52Z and 2020-09-12T11:03:53Z
2020-09-12 19:32:15
129.146.113.119 attackspam
(mod_security) mod_security (id:210492) triggered by 129.146.113.119 (US/United States/-): 5 in the last 3600 secs
2020-09-12 19:39:41

Recently Reported IPs

161.10.238.226 95.79.57.95 217.100.213.170 51.15.226.72
1.54.161.77 3.92.241.146 80.82.67.161 5.9.31.26
193.92.241.162 200.222.220.246 177.158.178.87 112.33.13.139
113.160.250.158 95.29.146.171 200.107.59.83 190.7.252.83
91.241.235.187 1.172.101.233 210.1.87.118 24.4.6.114