Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Rosemere

Region: Quebec

Country: Canada

Internet Service Provider: Videotron

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.45.45.45 attackspambots
29.11.2019 04:58:39 Recursive DNS scan
2019-11-29 13:18:53
45.45.45.45 attackspam
23.11.2019 04:54:34 Recursive DNS scan
2019-11-23 13:56:42
45.45.45.45 attackspam
18.11.2019 04:53:14 Recursive DNS scan
2019-11-18 13:54:55
45.45.45.45 attackbotsspam
02.11.2019 11:50:00 Recursive DNS scan
2019-11-03 03:10:26
45.45.45.45 attackspambots
02.11.2019 05:02:59 Recursive DNS scan
2019-11-02 15:43:15
45.45.45.45 attack
31.10.2019 11:08:23 Recursive DNS scan
2019-10-31 19:48:16
45.45.45.45 attack
27.10.2019 04:55:36 Recursive DNS scan
2019-10-27 14:25:14
45.45.45.45 attackspambots
23.10.2019 09:32:38 Recursive DNS scan
2019-10-23 18:55:46
45.45.45.45 attackbots
22.10.2019 09:26:13 Recursive DNS scan
2019-10-22 19:03:05
45.45.45.45 attack
21.10.2019 03:54:07 Recursive DNS scan
2019-10-21 13:20:58
45.45.45.45 attackspam
20.10.2019 09:25:53 Recursive DNS scan
2019-10-20 17:53:58
45.45.45.45 attackspam
19.10.2019 03:50:37 Recursive DNS scan
2019-10-19 16:43:03
45.45.45.45 attackspambots
recursive dns scanning
2019-10-16 21:26:59
45.45.45.45 attack
15.10.2019 04:22:31 Recursive DNS scan
2019-10-15 16:47:26
45.45.45.45 attack
14.10.2019 11:52:18 Recursive DNS scan
2019-10-14 22:00:58
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 45.45.45.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28272
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;45.45.45.3.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 17:55:00 CST 2021
;; MSG SIZE  rcvd: 39

'
Host info
3.45.45.45.in-addr.arpa domain name pointer modemcable003.45-45-45.mc.videotron.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
3.45.45.45.in-addr.arpa	name = modemcable003.45-45-45.mc.videotron.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.199.20.202 attackspam
Invalid user jl from 139.199.20.202 port 60256
2020-04-03 04:04:06
58.187.12.168 attackbots
1585831260 - 04/02/2020 14:41:00 Host: 58.187.12.168/58.187.12.168 Port: 445 TCP Blocked
2020-04-03 04:09:20
93.49.11.206 attack
fail2ban
2020-04-03 04:36:17
150.223.18.234 attack
Tried sshing with brute force.
2020-04-03 04:16:40
180.182.245.91 attackspambots
firewall-block, port(s): 8080/tcp
2020-04-03 04:37:44
78.23.120.74 attackbots
Automatic report - Port Scan Attack
2020-04-03 04:24:48
88.98.192.83 attackspam
fail2ban
2020-04-03 04:33:27
217.21.193.74 attackbotsspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-04-03 04:21:18
102.23.243.199 attack
Automatic report - Port Scan Attack
2020-04-03 04:13:20
106.51.3.214 attack
Apr  2 20:09:31 IngegnereFirenze sshd[3080]: User root from 106.51.3.214 not allowed because not listed in AllowUsers
...
2020-04-03 04:10:28
175.6.35.207 attack
Apr  2 13:56:13 server1 sshd\[20394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.35.207  user=root
Apr  2 13:56:15 server1 sshd\[20394\]: Failed password for root from 175.6.35.207 port 55248 ssh2
Apr  2 13:59:26 server1 sshd\[21338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.35.207  user=root
Apr  2 13:59:28 server1 sshd\[21338\]: Failed password for root from 175.6.35.207 port 37252 ssh2
Apr  2 14:02:42 server1 sshd\[22350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.35.207  user=root
...
2020-04-03 04:17:29
130.185.155.34 attack
Invalid user elaine from 130.185.155.34 port 57790
2020-04-03 04:14:49
186.113.18.109 attackbots
leo_www
2020-04-03 04:19:30
194.184.198.62 attack
Invalid user snoop from 194.184.198.62 port 19162
2020-04-03 04:09:46
218.94.103.226 attackspambots
Apr  2 21:09:33 * sshd[28041]: Failed password for root from 218.94.103.226 port 44780 ssh2
Apr  2 21:13:44 * sshd[28561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.103.226
2020-04-03 04:34:05

Recently Reported IPs

14.248.85.235 103.249.234.44 155.94.220.161 113.185.72.183
113.185.72.184 173.10.1.195 5.184.33.149 176.72.22.217
83.43.125.89 103.153.183.227 162.243.12.152 89.56.150.148
23.200.208.137 198.16.76.130 140.213.57.74 45.57.255.35
51.81.84.144 187.85.3.59 181.47.31.212 201.40.92.147