Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Salt Lake City

Region: Utah

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.45.132.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6825
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.45.132.207.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024123000 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 30 21:48:05 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 207.132.45.45.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 45.45.132.207.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
91.121.103.175 attack
Oct 23 10:11:31 hanapaa sshd\[27956\]: Invalid user huawei from 91.121.103.175
Oct 23 10:11:31 hanapaa sshd\[27956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns354139.ip-91-121-103.eu
Oct 23 10:11:33 hanapaa sshd\[27956\]: Failed password for invalid user huawei from 91.121.103.175 port 44066 ssh2
Oct 23 10:17:08 hanapaa sshd\[28389\]: Invalid user pentaho from 91.121.103.175
Oct 23 10:17:08 hanapaa sshd\[28389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns354139.ip-91-121-103.eu
2019-10-24 04:49:58
185.54.179.62 attackbots
10/23/2019-22:16:42.877069 185.54.179.62 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-10-24 05:03:42
200.69.236.112 attack
Oct 23 22:12:59 ns41 sshd[10401]: Failed password for root from 200.69.236.112 port 55494 ssh2
Oct 23 22:17:39 ns41 sshd[10594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.236.112
Oct 23 22:17:41 ns41 sshd[10594]: Failed password for invalid user shun from 200.69.236.112 port 47088 ssh2
2019-10-24 04:28:38
115.28.245.132 attack
Automatic report - XMLRPC Attack
2019-10-24 04:34:13
178.32.161.90 attackspambots
Oct 24 00:23:15 microserver sshd[22293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.161.90  user=root
Oct 24 00:23:17 microserver sshd[22293]: Failed password for root from 178.32.161.90 port 49930 ssh2
Oct 24 00:26:53 microserver sshd[22913]: Invalid user couchdb from 178.32.161.90 port 41747
Oct 24 00:26:53 microserver sshd[22913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.161.90
Oct 24 00:26:55 microserver sshd[22913]: Failed password for invalid user couchdb from 178.32.161.90 port 41747 ssh2
2019-10-24 04:50:17
88.199.101.103 attackbotsspam
Oct 23 20:47:17 hcbbdb sshd\[11060\]: Invalid user rustserver from 88.199.101.103
Oct 23 20:47:17 hcbbdb sshd\[11060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88-199-101-103.static.vifnet.pl
Oct 23 20:47:18 hcbbdb sshd\[11060\]: Failed password for invalid user rustserver from 88.199.101.103 port 43782 ssh2
Oct 23 20:51:37 hcbbdb sshd\[11521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88-199-101-103.static.vifnet.pl  user=root
Oct 23 20:51:39 hcbbdb sshd\[11521\]: Failed password for root from 88.199.101.103 port 35304 ssh2
2019-10-24 04:59:46
121.241.210.227 attackspam
Oct 23 09:41:48 odroid64 sshd\[1553\]: Invalid user applmgr from 121.241.210.227
Oct 23 09:41:48 odroid64 sshd\[1553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.210.227
Oct 23 09:41:50 odroid64 sshd\[1553\]: Failed password for invalid user applmgr from 121.241.210.227 port 35445 ssh2
...
2019-10-24 04:54:15
49.234.155.117 attack
Oct 23 22:49:48 [munged] sshd[28226]: Failed password for root from 49.234.155.117 port 47514 ssh2
2019-10-24 04:57:34
80.82.64.127 attackspambots
10/23/2019-22:17:06.045207 80.82.64.127 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 82
2019-10-24 04:51:07
222.186.175.183 attackspambots
Oct 23 23:39:27 www sshd\[31816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Oct 23 23:39:30 www sshd\[31816\]: Failed password for root from 222.186.175.183 port 32836 ssh2
Oct 23 23:39:35 www sshd\[31816\]: Failed password for root from 222.186.175.183 port 32836 ssh2
...
2019-10-24 04:43:40
145.239.8.229 attackbots
Oct 23 22:30:13 markkoudstaal sshd[7227]: Failed password for root from 145.239.8.229 port 60438 ssh2
Oct 23 22:34:13 markkoudstaal sshd[7573]: Failed password for root from 145.239.8.229 port 43948 ssh2
2019-10-24 04:45:45
58.213.128.106 attack
Oct 23 16:13:37 xtremcommunity sshd\[37183\]: Invalid user gawker from 58.213.128.106 port 6145
Oct 23 16:13:37 xtremcommunity sshd\[37183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.128.106
Oct 23 16:13:40 xtremcommunity sshd\[37183\]: Failed password for invalid user gawker from 58.213.128.106 port 6145 ssh2
Oct 23 16:17:43 xtremcommunity sshd\[37252\]: Invalid user ytrewq from 58.213.128.106 port 26817
Oct 23 16:17:43 xtremcommunity sshd\[37252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.128.106
...
2019-10-24 04:28:08
177.232.137.141 attackbotsspam
Automatic report - Port Scan Attack
2019-10-24 04:48:08
159.65.9.28 attack
2019-10-23T20:48:13.267401abusebot-4.cloudsearch.cf sshd\[31693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.9.28  user=root
2019-10-24 04:52:25
222.186.180.9 attack
Oct 23 22:28:39 dedicated sshd[29580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
Oct 23 22:28:40 dedicated sshd[29580]: Failed password for root from 222.186.180.9 port 19952 ssh2
2019-10-24 04:35:07

Recently Reported IPs

94.187.121.159 8.219.243.250 16.155.128.1 156.79.44.2
150.3.89.145 15.35.77.176 218.166.209.87 26.241.109.130
182.152.248.183 48.40.7.60 117.148.169.190 135.21.43.6
197.0.29.144 121.37.105.137 135.70.202.172 152.218.111.117
237.13.65.178 205.117.207.99 208.15.174.207 78.46.216.155