Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Owasso

Region: Oklahoma

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.30.56.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15156
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.30.56.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 04:38:57 CST 2025
;; MSG SIZE  rcvd: 105
Host info
145.56.30.45.in-addr.arpa domain name pointer 45-30-56-145.lightspeed.tulsok.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.56.30.45.in-addr.arpa	name = 45-30-56-145.lightspeed.tulsok.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
164.68.112.178 attack
ET SCAN Suspicious inbound to Oracle SQL port 1521 - port: 1521 proto: TCP cat: Potentially Bad Traffic
2020-04-29 04:47:21
27.147.219.174 attack
Automatic report - Windows Brute-Force Attack
2020-04-29 04:20:07
195.154.133.163 attackbots
195.154.133.163 - - [29/Apr/2020:00:24:31 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-04-29 04:27:26
91.134.242.199 attack
Apr 28 22:48:10 vpn01 sshd[11418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.242.199
Apr 28 22:48:12 vpn01 sshd[11418]: Failed password for invalid user linux from 91.134.242.199 port 43338 ssh2
...
2020-04-29 04:54:08
193.112.16.245 attackspam
prod8
...
2020-04-29 04:30:21
178.32.117.80 attack
Apr 28 22:27:29 ns3164893 sshd[12512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.117.80
Apr 28 22:27:31 ns3164893 sshd[12512]: Failed password for invalid user sysadmin from 178.32.117.80 port 34210 ssh2
...
2020-04-29 04:31:31
178.32.222.86 attackbotsspam
no
2020-04-29 04:31:05
212.145.81.163 attack
Unauthorized connection attempt detected from IP address 212.145.81.163 to port 445
2020-04-29 04:36:55
201.49.231.160 attackspam
Unauthorized connection attempt detected from IP address 201.49.231.160 to port 8080
2020-04-29 04:39:04
190.95.19.195 attackspambots
Unauthorized connection attempt detected from IP address 190.95.19.195 to port 445
2020-04-29 04:40:09
222.186.173.238 attackspam
$f2bV_matches
2020-04-29 04:55:44
195.161.38.150 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-04-29 04:26:10
181.114.101.78 attackbots
Unauthorized connection attempt detected from IP address 181.114.101.78 to port 8089
2020-04-29 04:43:04
45.5.136.250 attack
SSH login attemps.
2020-04-29 04:15:10
177.19.34.129 attackspambots
1588075587 - 04/28/2020 14:06:27 Host: 177.19.34.129/177.19.34.129 Port: 445 TCP Blocked
2020-04-29 04:32:06

Recently Reported IPs

49.222.176.73 205.141.114.147 168.111.197.183 99.209.219.150
22.196.149.107 164.209.239.61 39.230.137.211 82.193.197.185
26.82.197.66 238.247.171.105 231.208.1.209 54.185.63.192
250.129.14.245 177.89.209.23 167.116.232.236 167.27.159.216
209.128.77.194 197.61.245.100 69.174.6.196 244.143.19.246