Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.4.57.86 attackbots
Unauthorized connection attempt from IP address 45.4.57.86 on Port 445(SMB)
2020-04-29 22:57:35
45.4.57.206 attack
proto=tcp  .  spt=59295  .  dpt=25  .     (listed on Blocklist de  Jun 22)     (34)
2019-06-23 13:17:56
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.4.57.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34761
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.4.57.48.			IN	A

;; AUTHORITY SECTION:
.			189	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 11:24:33 CST 2022
;; MSG SIZE  rcvd: 103
Host info
48.57.4.45.in-addr.arpa domain name pointer 45-4-57-48.vntelecom.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.57.4.45.in-addr.arpa	name = 45-4-57-48.vntelecom.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.42.15 attackspambots
Oct  7 23:01:38 marvibiene sshd[11022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.15  user=root
Oct  7 23:01:40 marvibiene sshd[11022]: Failed password for root from 222.186.42.15 port 17360 ssh2
Oct  7 23:01:43 marvibiene sshd[11022]: Failed password for root from 222.186.42.15 port 17360 ssh2
Oct  7 23:01:38 marvibiene sshd[11022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.15  user=root
Oct  7 23:01:40 marvibiene sshd[11022]: Failed password for root from 222.186.42.15 port 17360 ssh2
Oct  7 23:01:43 marvibiene sshd[11022]: Failed password for root from 222.186.42.15 port 17360 ssh2
...
2019-10-08 07:05:08
180.168.141.246 attackspam
Oct  8 01:13:35 ArkNodeAT sshd\[20963\]: Invalid user Wachtwoord123 from 180.168.141.246
Oct  8 01:13:35 ArkNodeAT sshd\[20963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.141.246
Oct  8 01:13:38 ArkNodeAT sshd\[20963\]: Failed password for invalid user Wachtwoord123 from 180.168.141.246 port 34706 ssh2
2019-10-08 07:29:55
94.79.181.162 attackspam
Oct  8 05:50:51 webhost01 sshd[24742]: Failed password for root from 94.79.181.162 port 54314 ssh2
...
2019-10-08 07:24:41
167.71.228.9 attackspam
ssh failed login
2019-10-08 06:53:57
106.51.66.24 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 07-10-2019 20:50:17.
2019-10-08 06:53:43
138.229.97.6 attackspambots
Automatic report - Banned IP Access
2019-10-08 07:11:30
92.63.194.47 attack
Oct  7 18:46:05 mail sshd\[46774\]: Invalid user admin from 92.63.194.47
Oct  7 18:46:05 mail sshd\[46774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.47
...
2019-10-08 07:03:20
128.134.30.40 attackspam
Oct  8 01:07:25 markkoudstaal sshd[12029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.134.30.40
Oct  8 01:07:27 markkoudstaal sshd[12029]: Failed password for invalid user P@$$word!@#$ from 128.134.30.40 port 41322 ssh2
Oct  8 01:12:00 markkoudstaal sshd[12576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.134.30.40
2019-10-08 07:12:17
195.88.45.56 attack
https://gaa.adscale.de SCAM popupfestern Nervendes Gesindel !
2019-10-08 07:20:14
128.199.158.182 attackbots
www.rbtierfotografie.de 128.199.158.182 \[07/Oct/2019:21:49:52 +0200\] "POST /wp-login.php HTTP/1.1" 200 5867 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.rbtierfotografie.de 128.199.158.182 \[07/Oct/2019:21:49:55 +0200\] "POST /wp-login.php HTTP/1.1" 200 5856 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-08 07:11:54
186.148.162.100 attackspam
Sent mail to target address hacked/leaked from abandonia in 2016
2019-10-08 06:58:46
94.191.76.19 attackbotsspam
2019-10-07T18:26:13.6119761495-001 sshd\[9296\]: Failed password for invalid user Coco123 from 94.191.76.19 port 42920 ssh2
2019-10-07T18:38:58.2276471495-001 sshd\[10280\]: Invalid user Box2017 from 94.191.76.19 port 35482
2019-10-07T18:38:58.2364491495-001 sshd\[10280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.76.19
2019-10-07T18:38:59.7857541495-001 sshd\[10280\]: Failed password for invalid user Box2017 from 94.191.76.19 port 35482 ssh2
2019-10-07T18:43:21.3470971495-001 sshd\[10604\]: Invalid user Cent0s1234 from 94.191.76.19 port 42420
2019-10-07T18:43:21.3500391495-001 sshd\[10604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.76.19
...
2019-10-08 06:55:44
222.186.42.117 attackbotsspam
Oct  7 19:16:26 plusreed sshd[17787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.117  user=root
Oct  7 19:16:27 plusreed sshd[17787]: Failed password for root from 222.186.42.117 port 17034 ssh2
...
2019-10-08 07:19:48
68.183.156.156 attackspam
Oct  8 00:45:01 vps647732 sshd[18195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.156.156
Oct  8 00:45:04 vps647732 sshd[18195]: Failed password for invalid user vnc from 68.183.156.156 port 41416 ssh2
...
2019-10-08 07:00:15
103.47.82.221 attackspambots
Oct  7 19:14:16 plusreed sshd[17261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.47.82.221  user=root
Oct  7 19:14:18 plusreed sshd[17261]: Failed password for root from 103.47.82.221 port 56910 ssh2
...
2019-10-08 07:24:27

Recently Reported IPs

45.4.216.58 45.4.34.216 45.43.58.214 45.41.104.98
45.34.15.49 45.41.240.19 45.5.128.158 45.5.146.5
45.51.189.53 45.55.43.23 45.55.19.107 45.5.131.88
45.52.122.248 45.5.208.67 45.55.63.154 45.53.196.166
45.56.105.67 45.5.202.236 45.56.105.63 45.56.105.76