Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.40.54.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11805
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.40.54.48.			IN	A

;; AUTHORITY SECTION:
.			485	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061102 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 12:01:52 CST 2022
;; MSG SIZE  rcvd: 104
Host info
b'Host 48.54.40.45.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 45.40.54.48.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
186.139.183.56 attackspambots
Automatic report - Banned IP Access
2020-08-17 19:22:59
159.89.199.229 attackspambots
Aug 16 18:29:43 serwer sshd\[7352\]: Invalid user mna from 159.89.199.229 port 44952
Aug 16 18:29:43 serwer sshd\[7352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.199.229
Aug 16 18:29:46 serwer sshd\[7352\]: Failed password for invalid user mna from 159.89.199.229 port 44952 ssh2
...
2020-08-17 19:10:07
101.231.124.6 attackspambots
SSH invalid-user multiple login attempts
2020-08-17 19:11:55
112.220.80.74 attackbots
$f2bV_matches
2020-08-17 19:13:05
221.6.32.34 attackbotsspam
2020-08-17T10:06:05.782997abusebot-7.cloudsearch.cf sshd[26219]: Invalid user aaaaa from 221.6.32.34 port 45172
2020-08-17T10:06:05.790079abusebot-7.cloudsearch.cf sshd[26219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.6.32.34
2020-08-17T10:06:05.782997abusebot-7.cloudsearch.cf sshd[26219]: Invalid user aaaaa from 221.6.32.34 port 45172
2020-08-17T10:06:08.660859abusebot-7.cloudsearch.cf sshd[26219]: Failed password for invalid user aaaaa from 221.6.32.34 port 45172 ssh2
2020-08-17T10:10:34.172329abusebot-7.cloudsearch.cf sshd[26269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.6.32.34  user=root
2020-08-17T10:10:36.305465abusebot-7.cloudsearch.cf sshd[26269]: Failed password for root from 221.6.32.34 port 44224 ssh2
2020-08-17T10:14:56.152309abusebot-7.cloudsearch.cf sshd[26323]: Invalid user sysadmin from 221.6.32.34 port 43272
...
2020-08-17 19:45:54
41.193.122.77 attackspam
Aug 17 04:02:24 ws24vmsma01 sshd[195118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.193.122.77
Aug 17 04:02:24 ws24vmsma01 sshd[195134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.193.122.77
Aug 17 04:02:26 ws24vmsma01 sshd[195118]: Failed password for invalid user pi from 41.193.122.77 port 54738 ssh2
Aug 17 04:02:26 ws24vmsma01 sshd[195134]: Failed password for invalid user pi from 41.193.122.77 port 54740 ssh2
...
2020-08-17 19:39:47
45.88.12.52 attack
Aug 17 11:12:54 vps sshd[394943]: Invalid user minecraft from 45.88.12.52 port 55944
Aug 17 11:12:54 vps sshd[394943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.88.12.52
Aug 17 11:12:56 vps sshd[394943]: Failed password for invalid user minecraft from 45.88.12.52 port 55944 ssh2
Aug 17 11:14:52 vps sshd[403331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.88.12.52  user=root
Aug 17 11:14:54 vps sshd[403331]: Failed password for root from 45.88.12.52 port 55986 ssh2
...
2020-08-17 19:22:02
120.69.0.18 attackbotsspam
Unauthorized connection attempt from IP address 120.69.0.18 on Port 445(SMB)
2020-08-17 19:36:21
115.72.210.55 attackbots
20/8/16@23:54:48: FAIL: Alarm-Network address from=115.72.210.55
20/8/16@23:54:48: FAIL: Alarm-Network address from=115.72.210.55
...
2020-08-17 19:38:39
89.144.47.3 attack
*Port Scan* detected from 89.144.47.3 (NL/Netherlands/North Holland/Amsterdam/-). 4 hits in the last 50 seconds
2020-08-17 19:18:38
91.226.14.135 attackspam
Aug 17 12:08:41 mailserver sshd\[1752\]: Invalid user ron from 91.226.14.135
...
2020-08-17 19:16:26
138.197.129.38 attack
Aug 17 07:01:30 124388 sshd[30315]: Invalid user sam from 138.197.129.38 port 58294
Aug 17 07:01:30 124388 sshd[30315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.129.38
Aug 17 07:01:30 124388 sshd[30315]: Invalid user sam from 138.197.129.38 port 58294
Aug 17 07:01:32 124388 sshd[30315]: Failed password for invalid user sam from 138.197.129.38 port 58294 ssh2
Aug 17 07:05:23 124388 sshd[30468]: Invalid user teste2 from 138.197.129.38 port 38354
2020-08-17 19:38:03
183.162.79.39 attackspam
$f2bV_matches
2020-08-17 19:48:45
106.52.40.48 attack
Aug 17 15:41:47 gw1 sshd[15413]: Failed password for root from 106.52.40.48 port 38874 ssh2
...
2020-08-17 19:13:29
218.92.0.251 attackspambots
Aug 17 06:10:54 vps684187 sshd[19348]: Failed password for root from 218.92.0.251 port 58046 ssh2
Aug 17 06:10:57 vps684187 sshd[19348]: Failed password for root from 218.92.0.251 port 58046 ssh2
Aug 17 06:11:00 vps684187 sshd[19348]: Failed password for root from 218.92.0.251 port 58046 ssh2
Aug 17 06:11:04 vps684187 sshd[19348]: Failed password for root from 218.92.0.251 port 58046 ssh2
Aug 17 06:11:07 vps684187 sshd[19348]: Failed password for root from 218.92.0.251 port 58046 ssh2
Aug 17 06:11:10 vps684187 sshd[19348]: Failed password for root from 218.92.0.251 port 58046 ssh2
Aug 17 06:11:10 vps684187 sshd[19348]: error: maximum authentication attempts exceeded for root from 218.92.0.251 port 58046 ssh2 [preauth]
2020-08-17 19:11:24

Recently Reported IPs

217.21.78.79 137.226.16.117 137.226.17.3 137.226.16.136
202.29.13.51 137.226.17.25 137.226.17.28 223.244.88.243
137.226.16.168 137.226.16.128 68.32.144.139 49.87.194.217
169.229.221.128 104.198.90.175 179.43.156.182 137.226.21.57
140.238.254.122 137.226.21.63 68.183.82.171 137.226.21.68