Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Rosemere

Region: Quebec

Country: Canada

Internet Service Provider: Videotron

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.45.45.45 attackspambots
29.11.2019 04:58:39 Recursive DNS scan
2019-11-29 13:18:53
45.45.45.45 attackspam
23.11.2019 04:54:34 Recursive DNS scan
2019-11-23 13:56:42
45.45.45.45 attackspam
18.11.2019 04:53:14 Recursive DNS scan
2019-11-18 13:54:55
45.45.45.45 attackbotsspam
02.11.2019 11:50:00 Recursive DNS scan
2019-11-03 03:10:26
45.45.45.45 attackspambots
02.11.2019 05:02:59 Recursive DNS scan
2019-11-02 15:43:15
45.45.45.45 attack
31.10.2019 11:08:23 Recursive DNS scan
2019-10-31 19:48:16
45.45.45.45 attack
27.10.2019 04:55:36 Recursive DNS scan
2019-10-27 14:25:14
45.45.45.45 attackspambots
23.10.2019 09:32:38 Recursive DNS scan
2019-10-23 18:55:46
45.45.45.45 attackbots
22.10.2019 09:26:13 Recursive DNS scan
2019-10-22 19:03:05
45.45.45.45 attack
21.10.2019 03:54:07 Recursive DNS scan
2019-10-21 13:20:58
45.45.45.45 attackspam
20.10.2019 09:25:53 Recursive DNS scan
2019-10-20 17:53:58
45.45.45.45 attackspam
19.10.2019 03:50:37 Recursive DNS scan
2019-10-19 16:43:03
45.45.45.45 attackspambots
recursive dns scanning
2019-10-16 21:26:59
45.45.45.45 attack
15.10.2019 04:22:31 Recursive DNS scan
2019-10-15 16:47:26
45.45.45.45 attack
14.10.2019 11:52:18 Recursive DNS scan
2019-10-14 22:00:58
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 45.45.45.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28272
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;45.45.45.3.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 17:55:00 CST 2021
;; MSG SIZE  rcvd: 39

'
Host info
3.45.45.45.in-addr.arpa domain name pointer modemcable003.45-45-45.mc.videotron.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
3.45.45.45.in-addr.arpa	name = modemcable003.45-45-45.mc.videotron.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.140.229.185 attackspambots
Lines containing failures of 61.140.229.185
Feb 11 00:39:29 kmh-vmh-001-fsn03 sshd[15802]: Invalid user ftpuser from 61.140.229.185 port 33171
Feb 11 00:39:29 kmh-vmh-001-fsn03 sshd[15802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.140.229.185 
Feb 11 00:39:31 kmh-vmh-001-fsn03 sshd[15802]: Failed password for invalid user ftpuser from 61.140.229.185 port 33171 ssh2
Feb 11 00:39:32 kmh-vmh-001-fsn03 sshd[15802]: Received disconnect from 61.140.229.185 port 33171:11: Normal Shutdown [preauth]
Feb 11 00:39:32 kmh-vmh-001-fsn03 sshd[15802]: Disconnected from invalid user ftpuser 61.140.229.185 port 33171 [preauth]
Feb 11 00:41:24 kmh-vmh-001-fsn03 sshd[18909]: Invalid user user from 61.140.229.185 port 32098
Feb 11 00:41:24 kmh-vmh-001-fsn03 sshd[18909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.140.229.185 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=61.140.22
2020-02-13 00:25:47
218.92.0.175 attackspam
2020-02-12T15:43:16.772930shield sshd\[4170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175  user=root
2020-02-12T15:43:18.434344shield sshd\[4170\]: Failed password for root from 218.92.0.175 port 5889 ssh2
2020-02-12T15:43:22.748938shield sshd\[4170\]: Failed password for root from 218.92.0.175 port 5889 ssh2
2020-02-12T15:43:25.787223shield sshd\[4170\]: Failed password for root from 218.92.0.175 port 5889 ssh2
2020-02-12T15:43:28.909016shield sshd\[4170\]: Failed password for root from 218.92.0.175 port 5889 ssh2
2020-02-12 23:46:08
36.81.165.96 attack
Unauthorized connection attempt from IP address 36.81.165.96 on Port 445(SMB)
2020-02-13 00:00:22
72.192.16.62 attack
Feb 12 14:45:27 MK-Soft-VM6 sshd[22955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.192.16.62 
Feb 12 14:45:29 MK-Soft-VM6 sshd[22955]: Failed password for invalid user jackiehulu from 72.192.16.62 port 54544 ssh2
...
2020-02-12 23:49:27
78.21.71.243 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-12 23:58:55
80.66.81.36 attackspambots
Feb 12 15:33:50 mail postfix/smtpd\[16875\]: warning: unknown\[80.66.81.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb 12 15:34:11 mail postfix/smtpd\[16875\]: warning: unknown\[80.66.81.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb 12 15:43:31 mail postfix/smtpd\[17014\]: warning: unknown\[80.66.81.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb 12 16:18:14 mail postfix/smtpd\[17636\]: warning: unknown\[80.66.81.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-02-12 23:43:07
192.241.239.146 attackspambots
990/tcp 953/tcp 9160/tcp...
[2020-02-01/12]9pkt,8pt.(tcp),1pt.(udp)
2020-02-12 23:40:04
125.160.238.2 attack
SSH/22 MH Probe, BF, Hack -
2020-02-13 00:24:33
111.10.43.244 attackbots
Feb 12 11:07:55 plusreed sshd[24500]: Invalid user oracle!@#$%^ from 111.10.43.244
...
2020-02-13 00:08:48
2600:3c03::f03c:92ff:fe2c:2c3b attackbotsspam
none
2020-02-13 00:07:35
222.186.20.71 attackspam
Automatic report - Windows Brute-Force Attack
2020-02-13 00:01:01
45.55.233.213 attackbots
Feb 12 19:31:15 gw1 sshd[14084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.233.213
Feb 12 19:31:17 gw1 sshd[14084]: Failed password for invalid user pcguest from 45.55.233.213 port 35720 ssh2
...
2020-02-12 23:46:53
45.143.222.209 attack
Subject: REQUEST FOR QUOTE
Date: 12 Feb 2020 14:06:26 +0100
Message ID: <20200212140626.DBF8926B3169C326@bombardi.cz>
Virus/Unauthorized code: >>> AVE/Heur.AdvML.B!100-SH in '17858026_6X_AZ_PA4__OBJEDNAT.exe'
2020-02-12 23:51:07
111.204.243.142 attackspam
firewall-block, port(s): 1433/tcp
2020-02-13 00:17:44
112.170.72.170 attackspambots
Feb 12 16:49:35 mout sshd[11109]: Invalid user clio from 112.170.72.170 port 39522
2020-02-13 00:20:04

Recently Reported IPs

14.248.85.235 103.249.234.44 155.94.220.161 113.185.72.183
113.185.72.184 173.10.1.195 5.184.33.149 176.72.22.217
83.43.125.89 103.153.183.227 162.243.12.152 89.56.150.148
23.200.208.137 198.16.76.130 140.213.57.74 45.57.255.35
51.81.84.144 187.85.3.59 181.47.31.212 201.40.92.147