Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: Le Groupe Videotron Ltee

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspambots
29.11.2019 04:58:39 Recursive DNS scan
2019-11-29 13:18:53
attackspam
23.11.2019 04:54:34 Recursive DNS scan
2019-11-23 13:56:42
attackspam
18.11.2019 04:53:14 Recursive DNS scan
2019-11-18 13:54:55
attackbotsspam
02.11.2019 11:50:00 Recursive DNS scan
2019-11-03 03:10:26
attackspambots
02.11.2019 05:02:59 Recursive DNS scan
2019-11-02 15:43:15
attack
31.10.2019 11:08:23 Recursive DNS scan
2019-10-31 19:48:16
attack
27.10.2019 04:55:36 Recursive DNS scan
2019-10-27 14:25:14
attackspambots
23.10.2019 09:32:38 Recursive DNS scan
2019-10-23 18:55:46
attackbots
22.10.2019 09:26:13 Recursive DNS scan
2019-10-22 19:03:05
attack
21.10.2019 03:54:07 Recursive DNS scan
2019-10-21 13:20:58
attackspam
20.10.2019 09:25:53 Recursive DNS scan
2019-10-20 17:53:58
attackspam
19.10.2019 03:50:37 Recursive DNS scan
2019-10-19 16:43:03
attackspambots
recursive dns scanning
2019-10-16 21:26:59
attack
15.10.2019 04:22:31 Recursive DNS scan
2019-10-15 16:47:26
attack
14.10.2019 11:52:18 Recursive DNS scan
2019-10-14 22:00:58
attackbotsspam
14.10.2019 09:25:03 Recursive DNS scan
2019-10-14 18:54:17
attack
13.10.2019 11:01:53 Recursive DNS scan
2019-10-13 19:24:02
attackspambots
11.10.2019 09:30:38 Recursive DNS scan
2019-10-11 17:39:14
attack
10.10.2019 09:28:24 Recursive DNS scan
2019-10-10 17:37:41
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.45.45.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47679
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.45.45.45.			IN	A

;; AUTHORITY SECTION:
.			580	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101000 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 10 17:37:38 CST 2019
;; MSG SIZE  rcvd: 115
Host info
45.45.45.45.in-addr.arpa domain name pointer modemcable045.45-45-45.mc.videotron.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.45.45.45.in-addr.arpa	name = modemcable045.45-45-45.mc.videotron.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.82.108.79 attackspam
Unauthorized connection attempt detected from IP address 177.82.108.79 to port 23
2020-03-17 19:12:20
78.130.247.162 attackbotsspam
Unauthorized connection attempt detected from IP address 78.130.247.162 to port 5555
2020-03-17 18:51:34
85.122.8.89 attack
Unauthorized connection attempt detected from IP address 85.122.8.89 to port 23
2020-03-17 19:21:50
41.228.175.30 attackspambots
Unauthorized connection attempt detected from IP address 41.228.175.30 to port 81
2020-03-17 18:56:56
121.180.208.154 attackbotsspam
Unauthorized connection attempt detected from IP address 121.180.208.154 to port 23
2020-03-17 18:42:59
93.148.245.9 attackspambots
Unauthorized connection attempt detected from IP address 93.148.245.9 to port 88
2020-03-17 19:20:25
93.79.102.19 attackbotsspam
Unauthorized connection attempt detected from IP address 93.79.102.19 to port 26
2020-03-17 19:20:56
41.64.172.51 attackbots
Unauthorized connection attempt detected from IP address 41.64.172.51 to port 445
2020-03-17 18:57:52
91.126.238.113 attack
Honeypot attack, port: 5555, PTR: cli-5b7eee71.bcn.adamo.es.
2020-03-17 18:46:45
95.246.12.141 attackspambots
Unauthorized connection attempt detected from IP address 95.246.12.141 to port 23
2020-03-17 19:19:27
175.198.79.21 attackbotsspam
Unauthorized connection attempt detected from IP address 175.198.79.21 to port 23
2020-03-17 19:13:32
49.146.35.154 attackbots
Unauthorized connection attempt detected from IP address 49.146.35.154 to port 445
2020-03-17 18:53:42
78.166.139.154 attackbots
Unauthorized connection attempt detected from IP address 78.166.139.154 to port 23
2020-03-17 18:51:07
92.251.57.20 attackbots
Unauthorized connection attempt detected from IP address 92.251.57.20 to port 5555
2020-03-17 18:46:03
77.42.109.218 attackbots
Unauthorized connection attempt detected from IP address 77.42.109.218 to port 23
2020-03-17 19:24:16

Recently Reported IPs

22.232.10.12 0.12.44.89 152.4.117.214 34.217.67.66
152.44.99.70 125.167.245.36 36.80.142.190 80.211.169.105
81.221.132.15 34.219.141.74 43.226.35.245 202.71.9.242
185.108.166.154 159.205.102.24 95.10.8.90 28.31.46.37
139.199.20.202 121.28.142.134 3.222.35.82 217.125.150.134