Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Québec

Region: Quebec

Country: Canada

Internet Service Provider: Videotron

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.45.45.45 attackspambots
29.11.2019 04:58:39 Recursive DNS scan
2019-11-29 13:18:53
45.45.45.45 attackspam
23.11.2019 04:54:34 Recursive DNS scan
2019-11-23 13:56:42
45.45.45.45 attackspam
18.11.2019 04:53:14 Recursive DNS scan
2019-11-18 13:54:55
45.45.45.45 attackbotsspam
02.11.2019 11:50:00 Recursive DNS scan
2019-11-03 03:10:26
45.45.45.45 attackspambots
02.11.2019 05:02:59 Recursive DNS scan
2019-11-02 15:43:15
45.45.45.45 attack
31.10.2019 11:08:23 Recursive DNS scan
2019-10-31 19:48:16
45.45.45.45 attack
27.10.2019 04:55:36 Recursive DNS scan
2019-10-27 14:25:14
45.45.45.45 attackspambots
23.10.2019 09:32:38 Recursive DNS scan
2019-10-23 18:55:46
45.45.45.45 attackbots
22.10.2019 09:26:13 Recursive DNS scan
2019-10-22 19:03:05
45.45.45.45 attack
21.10.2019 03:54:07 Recursive DNS scan
2019-10-21 13:20:58
45.45.45.45 attackspam
20.10.2019 09:25:53 Recursive DNS scan
2019-10-20 17:53:58
45.45.45.45 attackspam
19.10.2019 03:50:37 Recursive DNS scan
2019-10-19 16:43:03
45.45.45.45 attackspambots
recursive dns scanning
2019-10-16 21:26:59
45.45.45.45 attack
15.10.2019 04:22:31 Recursive DNS scan
2019-10-15 16:47:26
45.45.45.45 attack
14.10.2019 11:52:18 Recursive DNS scan
2019-10-14 22:00:58
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.45.45.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45712
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.45.45.39.			IN	A

;; AUTHORITY SECTION:
.			232	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023100500 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 05 19:06:39 CST 2023
;; MSG SIZE  rcvd: 104
Host info
39.45.45.45.in-addr.arpa domain name pointer modemcable039.45-45-45.mc.videotron.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.45.45.45.in-addr.arpa	name = modemcable039.45-45-45.mc.videotron.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.142.87.162 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 03:35:42,552 INFO [shellcode_manager] (14.142.87.162) no match, writing hexdump (3af66295d986dba46c224093383e3245 :2099546) - MS17010 (EternalBlue)
2019-07-03 13:51:57
92.119.160.125 attackspambots
03.07.2019 04:51:24 Connection to port 3224 blocked by firewall
2019-07-03 13:55:25
89.104.109.70 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-05-06/07-03]8pkt,1pt.(tcp)
2019-07-03 13:35:21
185.222.211.166 attackspam
3389/tcp 3389/tcp 3389/tcp...
[2019-06-29/07-03]5pkt,1pt.(tcp)
2019-07-03 13:43:40
117.2.25.161 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-05-31/07-03]6pkt,1pt.(tcp)
2019-07-03 14:09:41
218.61.16.187 attackspam
1433/tcp 1433/tcp 1433/tcp...
[2019-06-27/07-03]5pkt,1pt.(tcp)
2019-07-03 14:12:24
178.175.132.68 attackspam
(From mt.uriarte@yahoo.com) Beautiful girls are looking for sex in your city: https://hideuri.com/xNW0Mj
2019-07-03 14:01:22
159.65.7.56 attack
Invalid user ftpuser from 159.65.7.56 port 49610
2019-07-03 13:37:08
68.183.204.202 attackbotsspam
Banned for posting to wp-login.php without referer {"redirect_to":"","user_email":"master@createsimpledomain.icu","user_login":"mastericuuu","wp-submit":"Register"}
2019-07-03 13:59:54
162.218.64.173 attackspambots
2222/tcp 2222/tcp 2222/tcp...
[2019-06-13/07-03]4pkt,1pt.(tcp)
2019-07-03 14:08:01
193.107.247.2 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 03:42:07,701 INFO [shellcode_manager] (193.107.247.2) no match, writing hexdump (473f8c91de69ecbc90b1378250fab623 :2479602) - MS17010 (EternalBlue)
2019-07-03 14:21:48
111.120.135.131 attackbots
DATE:2019-07-03_05:54:08, IP:111.120.135.131, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2019-07-03 13:42:31
82.223.69.53 attackbotsspam
Banned for posting to wp-login.php without referer {"redirect_to":"","user_email":"master@createsimpledomain.icu","user_login":"mastericuuu","wp-submit":"Register"}
2019-07-03 14:19:43
13.66.192.66 attack
Jul  2 22:50:28 gcems sshd\[21064\]: Invalid user ryan from 13.66.192.66 port 38992
Jul  2 22:50:28 gcems sshd\[21064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.66.192.66
Jul  2 22:50:30 gcems sshd\[21064\]: Failed password for invalid user ryan from 13.66.192.66 port 38992 ssh2
Jul  2 22:53:16 gcems sshd\[21109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.66.192.66  user=postgres
Jul  2 22:53:18 gcems sshd\[21109\]: Failed password for postgres from 13.66.192.66 port 36688 ssh2
...
2019-07-03 14:11:36
46.149.182.92 attackbotsspam
Jul  3 06:49:49 mail sshd\[31744\]: Invalid user engel from 46.149.182.92
Jul  3 06:49:49 mail sshd\[31744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.149.182.92
Jul  3 06:49:51 mail sshd\[31744\]: Failed password for invalid user engel from 46.149.182.92 port 52008 ssh2
...
2019-07-03 13:46:57

Recently Reported IPs

23.247.105.10 172.105.123.163 55.226.52.25 85.26.235.168
52.51.108.1 72.14.201.48 89.149.84.209 203.166.131.107
104.243.27.251 37.19.217.244 170.182.69.184 69.158.246.72
185.63.125.56 5.173.137.152 193.46.255.3 2.180.0.9
2.180.0.90 99.217.8.60 11.232.0.191 12.67.87.239