Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.45.40.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60102
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.45.40.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 00:33:42 CST 2025
;; MSG SIZE  rcvd: 104
Host info
80.40.45.45.in-addr.arpa domain name pointer modemcable080.40-45-45.mc.videotron.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.40.45.45.in-addr.arpa	name = modemcable080.40-45-45.mc.videotron.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
35.200.241.227 attackspam
Jul 10 01:27:14 firewall sshd[11570]: Invalid user libuuid from 35.200.241.227
Jul 10 01:27:16 firewall sshd[11570]: Failed password for invalid user libuuid from 35.200.241.227 port 33100 ssh2
Jul 10 01:31:09 firewall sshd[11654]: Invalid user caley from 35.200.241.227
...
2020-07-10 12:36:48
47.176.104.74 attackspam
$f2bV_matches
2020-07-10 12:46:07
122.51.214.44 attack
$f2bV_matches
2020-07-10 12:13:18
103.86.180.10 attack
SSH auth scanning - multiple failed logins
2020-07-10 12:49:22
190.5.228.74 attackspambots
prod8
...
2020-07-10 12:31:45
51.161.12.231 attackspambots
SmallBizIT.US 5 packets to tcp(8545)
2020-07-10 12:17:36
222.186.180.8 attackbotsspam
[MK-Root1] SSH login failed
2020-07-10 12:31:15
61.132.52.45 attackspambots
$f2bV_matches
2020-07-10 12:40:36
49.234.17.252 attack
Jul 10 06:30:49 lnxweb61 sshd[9514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.17.252
Jul 10 06:30:49 lnxweb61 sshd[9514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.17.252
2020-07-10 12:37:35
162.0.231.106 attackbotsspam
2020-07-10T06:24:09+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-07-10 12:39:45
89.204.154.177 attack
[MK-VM1] Blocked by UFW
2020-07-10 12:28:31
195.9.97.134 attackbots
Helo
2020-07-10 12:47:47
159.192.143.249 attackbotsspam
Bruteforce detected by fail2ban
2020-07-10 12:26:37
49.235.73.150 attackbots
Jul 10 06:57:09 hosting sshd[31366]: Invalid user sito from 49.235.73.150 port 45146
...
2020-07-10 12:46:50
185.153.199.135 botsattack
Suspect Bot
2020-07-10 12:26:50

Recently Reported IPs

148.245.207.79 232.206.186.7 252.230.164.115 241.194.159.203
162.72.11.195 161.26.242.73 193.242.112.21 248.123.216.156
80.174.128.69 220.132.73.184 53.90.55.156 22.145.26.12
216.163.193.222 187.210.244.149 122.181.202.107 228.34.88.218
167.63.45.68 241.200.119.170 251.10.202.19 73.97.224.47