Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santa Clara

Region: California

Country: United States

Internet Service Provider: Softcom Internet Communications, Inc

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.39.66.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8537
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.39.66.137.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 08:05:42 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 137.66.39.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 137.66.39.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.54.214.185 attackbotsspam
Brute-force attempt banned
2019-11-29 20:15:37
139.155.83.98 attackbotsspam
Nov 29 09:24:20 nextcloud sshd\[18784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.83.98  user=root
Nov 29 09:24:22 nextcloud sshd\[18784\]: Failed password for root from 139.155.83.98 port 50496 ssh2
Nov 29 09:28:26 nextcloud sshd\[25370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.83.98  user=root
...
2019-11-29 20:18:43
159.65.11.106 attackspambots
port scan and connect, tcp 80 (http)
2019-11-29 20:42:32
92.118.37.86 attackspam
IPS SENSOR HIT - Export of IP address from IPS sensor - Port scan detected
2019-11-29 20:29:28
93.174.89.61 attackbotsspam
Autoban   93.174.89.61 AUTH/CONNECT
2019-11-29 20:47:47
123.206.68.35 attackbotsspam
Nov 29 01:15:33 aragorn sshd[1885]: Invalid user spark from 123.206.68.35
Nov 29 01:15:34 aragorn sshd[1883]: Invalid user spark from 123.206.68.35
Nov 29 01:15:36 aragorn sshd[1884]: Invalid user spark from 123.206.68.35
Nov 29 01:20:33 aragorn sshd[2993]: Invalid user hadoop from 123.206.68.35
...
2019-11-29 20:17:37
190.18.176.107 attackspambots
Nov 29 01:16:29 aragorn sshd[1897]: Invalid user oracle from 190.18.176.107
Nov 29 01:19:56 aragorn sshd[2042]: Invalid user hadoop from 190.18.176.107
Nov 29 01:19:57 aragorn sshd[2040]: Invalid user hadoop from 190.18.176.107
Nov 29 01:19:57 aragorn sshd[2041]: Invalid user hadoop from 190.18.176.107
...
2019-11-29 20:32:36
129.28.154.240 attackbots
Nov 29 08:45:12 ns382633 sshd\[23359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.154.240  user=root
Nov 29 08:45:14 ns382633 sshd\[23359\]: Failed password for root from 129.28.154.240 port 32928 ssh2
Nov 29 08:54:59 ns382633 sshd\[24722\]: Invalid user johnerik from 129.28.154.240 port 48680
Nov 29 08:54:59 ns382633 sshd\[24722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.154.240
Nov 29 08:55:01 ns382633 sshd\[24722\]: Failed password for invalid user johnerik from 129.28.154.240 port 48680 ssh2
2019-11-29 20:52:02
185.175.93.17 attackbotsspam
11/29/2019-06:53:00.354406 185.175.93.17 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-29 20:33:43
118.101.96.133 attackspambots
REQUESTED PAGE: /editBlackAndWhiteList
2019-11-29 20:35:34
104.236.230.165 attackbots
Nov 29 12:14:47 web8 sshd\[4548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.230.165  user=root
Nov 29 12:14:50 web8 sshd\[4548\]: Failed password for root from 104.236.230.165 port 54915 ssh2
Nov 29 12:17:33 web8 sshd\[5970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.230.165  user=root
Nov 29 12:17:35 web8 sshd\[5970\]: Failed password for root from 104.236.230.165 port 44618 ssh2
Nov 29 12:20:27 web8 sshd\[7568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.230.165  user=root
2019-11-29 20:47:30
201.86.69.118 attackbots
firewall-block, port(s): 80/tcp
2019-11-29 20:08:09
122.14.222.202 attack
Nov 29 13:51:43 ncomp sshd[31968]: Invalid user sandy_hsiao from 122.14.222.202
Nov 29 13:51:43 ncomp sshd[31968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.222.202
Nov 29 13:51:43 ncomp sshd[31968]: Invalid user sandy_hsiao from 122.14.222.202
Nov 29 13:51:45 ncomp sshd[31968]: Failed password for invalid user sandy_hsiao from 122.14.222.202 port 50618 ssh2
2019-11-29 20:34:11
223.99.207.250 attack
Automatic report - Port Scan
2019-11-29 20:11:21
37.59.224.39 attackspam
Nov 29 06:13:57 XXXXXX sshd[60430]: Invalid user pcap from 37.59.224.39 port 40363
2019-11-29 20:20:02

Recently Reported IPs

239.171.246.198 161.175.111.78 56.14.162.240 55.91.192.27
196.192.163.244 208.40.185.122 40.83.139.30 2.42.184.73
80.151.157.171 79.64.77.71 112.16.153.223 7.22.120.149
61.237.156.107 190.202.180.6 46.165.48.176 127.196.49.172
5.15.30.72 225.238.228.206 212.153.231.47 179.202.224.122