Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.45.46.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32367
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.45.46.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 05:09:57 CST 2025
;; MSG SIZE  rcvd: 105
Host info
145.46.45.45.in-addr.arpa domain name pointer modemcable145.46-45-45.mc.videotron.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.46.45.45.in-addr.arpa	name = modemcable145.46-45-45.mc.videotron.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
140.143.98.35 attack
Oct 30 16:40:43 ny01 sshd[14755]: Failed password for root from 140.143.98.35 port 34046 ssh2
Oct 30 16:45:18 ny01 sshd[15214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.98.35
Oct 30 16:45:20 ny01 sshd[15214]: Failed password for invalid user custlink from 140.143.98.35 port 43502 ssh2
2019-10-31 06:34:17
42.104.97.242 attack
Oct 30 23:00:30 vps666546 sshd\[11756\]: Invalid user www-user from 42.104.97.242 port 44515
Oct 30 23:00:30 vps666546 sshd\[11756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.97.242
Oct 30 23:00:32 vps666546 sshd\[11756\]: Failed password for invalid user www-user from 42.104.97.242 port 44515 ssh2
Oct 30 23:05:25 vps666546 sshd\[11829\]: Invalid user china22idc from 42.104.97.242 port 62069
Oct 30 23:05:25 vps666546 sshd\[11829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.97.242
...
2019-10-31 06:20:18
23.129.64.192 attackbots
Honeypot hit, critical abuseConfidenceScore, incoming Traffic from this IP
2019-10-31 06:09:14
183.184.72.157 attackspambots
Telnet Server BruteForce Attack
2019-10-31 06:17:08
190.48.106.86 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/190.48.106.86/ 
 
 AR - 1H : (55)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AR 
 NAME ASN : ASN22927 
 
 IP : 190.48.106.86 
 
 CIDR : 190.48.0.0/17 
 
 PREFIX COUNT : 244 
 
 UNIQUE IP COUNT : 4001024 
 
 
 ATTACKS DETECTED ASN22927 :  
  1H - 2 
  3H - 6 
  6H - 9 
 12H - 14 
 24H - 30 
 
 DateTime : 2019-10-30 21:27:27 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-31 06:07:02
222.186.180.41 attackspam
Oct 31 03:30:00 gw1 sshd[2433]: Failed password for root from 222.186.180.41 port 43570 ssh2
Oct 31 03:30:04 gw1 sshd[2433]: Failed password for root from 222.186.180.41 port 43570 ssh2
...
2019-10-31 06:38:33
185.53.91.21 attack
" "
2019-10-31 06:43:07
106.241.16.105 attack
SSH Brute-Force attacks
2019-10-31 06:38:50
196.189.89.82 attackbotsspam
Oct 30 21:17:33 georgia postfix/smtpd[50706]: connect from unknown[196.189.89.82]
Oct 30 21:17:34 georgia postfix/smtpd[50706]: warning: unknown[196.189.89.82]: SASL LOGIN authentication failed: authentication failure
Oct 30 21:17:35 georgia postfix/smtpd[50706]: lost connection after AUTH from unknown[196.189.89.82]
Oct 30 21:17:35 georgia postfix/smtpd[50706]: disconnect from unknown[196.189.89.82] ehlo=1 auth=0/1 commands=1/2
Oct 30 21:17:36 georgia postfix/smtpd[50706]: connect from unknown[196.189.89.82]
Oct 30 21:17:37 georgia postfix/smtpd[50706]: warning: unknown[196.189.89.82]: SASL LOGIN authentication failed: authentication failure
Oct 30 21:17:37 georgia postfix/smtpd[50706]: lost connection after AUTH from unknown[196.189.89.82]
Oct 30 21:17:37 georgia postfix/smtpd[50706]: disconnect from unknown[196.189.89.82] ehlo=1 auth=0/1 commands=1/2
Oct 30 21:17:42 georgia postfix/smtpd[50706]: connect from unknown[196.189.89.82]
Oct 30 21:17:43 georgia postfix/smtp........
-------------------------------
2019-10-31 06:23:03
87.161.163.133 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/87.161.163.133/ 
 
 DE - 1H : (65)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : DE 
 NAME ASN : ASN199090 
 
 IP : 87.161.163.133 
 
 CIDR : 87.160.0.0/11 
 
 PREFIX COUNT : 25 
 
 UNIQUE IP COUNT : 5119232 
 
 
 ATTACKS DETECTED ASN199090 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 2 
 24H - 2 
 
 DateTime : 2019-10-30 21:26:23 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-31 06:44:46
51.75.123.85 attackspambots
Oct 30 21:22:57 localhost sshd\[13444\]: Invalid user spark from 51.75.123.85
Oct 30 21:22:57 localhost sshd\[13444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.123.85
Oct 30 21:22:59 localhost sshd\[13444\]: Failed password for invalid user spark from 51.75.123.85 port 43920 ssh2
Oct 30 21:26:37 localhost sshd\[13630\]: Invalid user ubnt from 51.75.123.85
Oct 30 21:26:37 localhost sshd\[13630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.123.85
...
2019-10-31 06:36:04
123.126.20.94 attackspambots
Oct 30 21:54:08 localhost sshd\[14977\]: Invalid user \ from 123.126.20.94
Oct 30 21:54:08 localhost sshd\[14977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.126.20.94
Oct 30 21:54:10 localhost sshd\[14977\]: Failed password for invalid user \ from 123.126.20.94 port 49410 ssh2
Oct 30 21:58:12 localhost sshd\[15192\]: Invalid user devrey from 123.126.20.94
Oct 30 21:58:12 localhost sshd\[15192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.126.20.94
...
2019-10-31 06:34:39
118.89.30.76 attackbots
Oct 30 22:23:13 srv01 sshd[15252]: Invalid user yangjun from 118.89.30.76
Oct 30 22:23:13 srv01 sshd[15252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.30.76
Oct 30 22:23:13 srv01 sshd[15252]: Invalid user yangjun from 118.89.30.76
Oct 30 22:23:15 srv01 sshd[15252]: Failed password for invalid user yangjun from 118.89.30.76 port 57355 ssh2
Oct 30 22:27:20 srv01 sshd[15493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.30.76  user=root
Oct 30 22:27:21 srv01 sshd[15493]: Failed password for root from 118.89.30.76 port 21034 ssh2
...
2019-10-31 06:08:36
92.240.253.138 attackspambots
Port Scan: TCP/443
2019-10-31 06:32:29
117.132.14.250 attackspam
Oct 30 23:51:47 www4 sshd\[27979\]: Invalid user 12345\^ from 117.132.14.250
Oct 30 23:51:47 www4 sshd\[27979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.132.14.250
Oct 30 23:51:49 www4 sshd\[27979\]: Failed password for invalid user 12345\^ from 117.132.14.250 port 55926 ssh2
...
2019-10-31 06:16:52

Recently Reported IPs

18.232.239.55 16.57.87.22 75.47.108.87 59.68.212.229
142.179.4.132 51.134.136.105 96.254.216.213 212.62.190.52
95.97.220.224 254.213.178.194 49.174.27.111 253.64.152.88
49.160.203.47 160.0.159.54 31.183.5.14 213.161.0.58
92.168.253.44 57.198.128.229 139.107.175.118 76.226.38.177