Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.45.40.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60102
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.45.40.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 00:33:42 CST 2025
;; MSG SIZE  rcvd: 104
Host info
80.40.45.45.in-addr.arpa domain name pointer modemcable080.40-45-45.mc.videotron.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.40.45.45.in-addr.arpa	name = modemcable080.40-45-45.mc.videotron.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.166.211.194 attackspam
SSH Invalid Login
2020-07-10 06:02:10
46.101.224.184 attack
Jul  9 23:49:55 Ubuntu-1404-trusty-64-minimal sshd\[14371\]: Invalid user laurilee from 46.101.224.184
Jul  9 23:49:55 Ubuntu-1404-trusty-64-minimal sshd\[14371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.224.184
Jul  9 23:49:56 Ubuntu-1404-trusty-64-minimal sshd\[14371\]: Failed password for invalid user laurilee from 46.101.224.184 port 55284 ssh2
Jul  9 23:53:45 Ubuntu-1404-trusty-64-minimal sshd\[17231\]: Invalid user test from 46.101.224.184
Jul  9 23:53:45 Ubuntu-1404-trusty-64-minimal sshd\[17231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.224.184
2020-07-10 06:14:10
80.82.77.33 attackspambots
07/09/2020-17:07:23.434244 80.82.77.33 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-07-10 05:49:54
192.241.212.49 attackspambots
firewall-block, port(s): 135/tcp
2020-07-10 05:46:48
24.92.187.245 attackspambots
SSH Invalid Login
2020-07-10 05:56:10
122.114.11.101 attack
2020-07-09T17:01:30.7233591495-001 sshd[42178]: Failed password for invalid user userftp from 122.114.11.101 port 49464 ssh2
2020-07-09T17:04:39.9352371495-001 sshd[42272]: Invalid user phkuser from 122.114.11.101 port 40751
2020-07-09T17:04:39.9424291495-001 sshd[42272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.11.101
2020-07-09T17:04:39.9352371495-001 sshd[42272]: Invalid user phkuser from 122.114.11.101 port 40751
2020-07-09T17:04:42.0068851495-001 sshd[42272]: Failed password for invalid user phkuser from 122.114.11.101 port 40751 ssh2
2020-07-09T17:07:31.1244971495-001 sshd[42421]: Invalid user er from 122.114.11.101 port 60262
...
2020-07-10 05:44:47
161.117.11.230 attackbotsspam
Jul  9 22:14:16 xeon sshd[40732]: Failed password for invalid user wwilliam from 161.117.11.230 port 45122 ssh2
2020-07-10 06:07:25
213.149.103.132 attackspambots
timhelmke.de 213.149.103.132 [09/Jul/2020:22:20:20 +0200] "POST /wp-login.php HTTP/1.1" 200 5985 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
timhelmke.de 213.149.103.132 [09/Jul/2020:22:20:20 +0200] "POST /wp-login.php HTTP/1.1" 200 5941 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-10 05:45:43
62.233.73.23 attackspambots
62.233.73.23 - - [09/Jul/2020:22:20:25 +0200] "POST /xmlrpc.php HTTP/1.1" 403 5 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
62.233.73.23 - - [09/Jul/2020:22:20:25 +0200] "POST /xmlrpc.php HTTP/1.1" 403 5 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
...
2020-07-10 05:40:41
1.61.40.26 attackspambots
firewall-block, port(s): 37215/tcp
2020-07-10 06:09:52
138.204.78.249 attackbots
Jul  9 23:07:52 buvik sshd[20493]: Invalid user andralyn from 138.204.78.249
Jul  9 23:07:52 buvik sshd[20493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.78.249
Jul  9 23:07:54 buvik sshd[20493]: Failed password for invalid user andralyn from 138.204.78.249 port 46504 ssh2
...
2020-07-10 05:52:21
222.186.52.86 attackspambots
2020-07-09T21:21:57.263969server.espacesoutien.com sshd[10225]: Failed password for root from 222.186.52.86 port 34048 ssh2
2020-07-09T21:21:59.428240server.espacesoutien.com sshd[10225]: Failed password for root from 222.186.52.86 port 34048 ssh2
2020-07-09T21:23:06.135832server.espacesoutien.com sshd[10308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.86  user=root
2020-07-09T21:23:08.170478server.espacesoutien.com sshd[10308]: Failed password for root from 222.186.52.86 port 11291 ssh2
...
2020-07-10 06:10:06
192.241.245.248 attack
firewall-block, port(s): 10606/tcp
2020-07-10 05:46:02
182.23.68.119 attack
Brute-force attempt banned
2020-07-10 05:51:24
52.149.131.224 attackspambots
$f2bV_matches
2020-07-10 05:53:16

Recently Reported IPs

148.245.207.79 232.206.186.7 252.230.164.115 241.194.159.203
162.72.11.195 161.26.242.73 193.242.112.21 248.123.216.156
80.174.128.69 220.132.73.184 53.90.55.156 22.145.26.12
216.163.193.222 187.210.244.149 122.181.202.107 228.34.88.218
167.63.45.68 241.200.119.170 251.10.202.19 73.97.224.47