Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.48.60.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54145
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.48.60.81.			IN	A

;; AUTHORITY SECTION:
.			319	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102101 1800 900 604800 86400

;; Query time: 139 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 22 08:07:13 CST 2019
;; MSG SIZE  rcvd: 115
Host info
81.60.48.45.in-addr.arpa domain name pointer cpe-45-48-60-81.socal.res.rr.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
81.60.48.45.in-addr.arpa	name = cpe-45-48-60-81.socal.res.rr.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.254.123.131 attack
Jul 20 06:54:38 MK-Soft-VM7 sshd\[11642\]: Invalid user fp from 51.254.123.131 port 47960
Jul 20 06:54:38 MK-Soft-VM7 sshd\[11642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.123.131
Jul 20 06:54:39 MK-Soft-VM7 sshd\[11642\]: Failed password for invalid user fp from 51.254.123.131 port 47960 ssh2
...
2019-07-20 15:18:45
221.204.102.250 attackspam
Jul2003:27:54server2pure-ftpd:\(\?@221.204.102.250\)[WARNING]Authenticationfailedforuser[anonymous]Jul2003:27:59server2pure-ftpd:\(\?@221.204.102.250\)[WARNING]Authenticationfailedforuser[www]Jul2003:28:07server2pure-ftpd:\(\?@221.204.102.250\)[WARNING]Authenticationfailedforuser[www]Jul2003:28:14server2pure-ftpd:\(\?@221.204.102.250\)[WARNING]Authenticationfailedforuser[purexis]Jul2003:28:20server2pure-ftpd:\(\?@221.204.102.250\)[WARNING]Authenticationfailedforuser[purexis]Jul2003:28:26server2pure-ftpd:\(\?@221.204.102.250\)[WARNING]Authenticationfailedforuser[www]Jul2003:28:32server2pure-ftpd:\(\?@221.204.102.250\)[WARNING]Authenticationfailedforuser[www]Jul2003:28:37server2pure-ftpd:\(\?@221.204.102.250\)[WARNING]Authenticationfailedforuser[www]
2019-07-20 14:59:30
5.67.154.151 attackspam
Automatic report - Port Scan Attack
2019-07-20 15:16:57
117.3.80.14 attack
MagicSpam Rule: valid_helo_domain; Spammer IP: 117.3.80.14
2019-07-20 14:41:32
119.42.175.200 attack
Jul 20 06:35:16 MK-Soft-VM3 sshd\[15428\]: Invalid user fordcom from 119.42.175.200 port 43716
Jul 20 06:35:16 MK-Soft-VM3 sshd\[15428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.42.175.200
Jul 20 06:35:18 MK-Soft-VM3 sshd\[15428\]: Failed password for invalid user fordcom from 119.42.175.200 port 43716 ssh2
...
2019-07-20 14:57:26
77.247.108.154 attackspambots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-07-20 15:02:46
121.142.111.222 attack
Jul 20 06:58:18 areeb-Workstation sshd\[32071\]: Invalid user xk from 121.142.111.222
Jul 20 06:58:18 areeb-Workstation sshd\[32071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.142.111.222
Jul 20 06:58:20 areeb-Workstation sshd\[32071\]: Failed password for invalid user xk from 121.142.111.222 port 49834 ssh2
...
2019-07-20 15:07:40
120.92.102.121 attackspambots
2019-07-20T06:57:50.317262abusebot-4.cloudsearch.cf sshd\[18065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.102.121  user=root
2019-07-20 15:22:25
164.132.47.139 attackbots
Jul 20 08:02:42 web1 sshd\[26468\]: Invalid user sumit from 164.132.47.139
Jul 20 08:02:42 web1 sshd\[26468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.47.139
Jul 20 08:02:44 web1 sshd\[26468\]: Failed password for invalid user sumit from 164.132.47.139 port 57348 ssh2
Jul 20 08:09:08 web1 sshd\[26862\]: Invalid user th from 164.132.47.139
Jul 20 08:09:08 web1 sshd\[26862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.47.139
2019-07-20 15:10:07
185.203.168.94 attackbots
Caught in portsentry honeypot
2019-07-20 15:07:17
37.59.51.51 attackspam
2019-07-20T06:56:38.864141abusebot.cloudsearch.cf sshd\[31419\]: Invalid user zabbix from 37.59.51.51 port 47838
2019-07-20 15:08:55
178.128.108.22 attackspam
Jul 20 09:37:16 srv-4 sshd\[28612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.108.22  user=ftp
Jul 20 09:37:18 srv-4 sshd\[28612\]: Failed password for ftp from 178.128.108.22 port 44474 ssh2
Jul 20 09:42:47 srv-4 sshd\[29112\]: Invalid user demouser from 178.128.108.22
Jul 20 09:42:47 srv-4 sshd\[29112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.108.22
...
2019-07-20 15:27:37
134.255.225.26 attack
Jul 20 00:25:24 vps200512 sshd\[17523\]: Invalid user thai007xng from 134.255.225.26
Jul 20 00:25:24 vps200512 sshd\[17523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.255.225.26
Jul 20 00:25:26 vps200512 sshd\[17523\]: Failed password for invalid user thai007xng from 134.255.225.26 port 53176 ssh2
Jul 20 00:33:10 vps200512 sshd\[17682\]: Invalid user darel022 from 134.255.225.26
Jul 20 00:33:10 vps200512 sshd\[17682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.255.225.26
2019-07-20 14:40:01
82.64.15.106 attack
Invalid user ethos from 82.64.15.106 port 50430
2019-07-20 14:46:56
134.73.161.122 attackspam
Jul 15 15:02:21 dns01 sshd[27840]: Invalid user desenv from 134.73.161.122
Jul 15 15:02:21 dns01 sshd[27840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.161.122
Jul 15 15:02:23 dns01 sshd[27840]: Failed password for invalid user desenv from 134.73.161.122 port 56520 ssh2
Jul 15 15:02:23 dns01 sshd[27840]: Received disconnect from 134.73.161.122 port 56520:11: Bye Bye [preauth]
Jul 15 15:02:23 dns01 sshd[27840]: Disconnected from 134.73.161.122 port 56520 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.73.161.122
2019-07-20 14:58:57

Recently Reported IPs

64.196.64.194 95.33.239.106 188.235.107.7 188.81.139.133
182.103.12.233 156.238.167.62 154.16.171.6 78.128.113.133
103.81.39.60 104.248.94.159 218.106.254.221 194.189.178.231
76.52.62.53 185.164.191.254 123.10.7.199 9.80.196.208
54.153.65.81 168.228.192.51 140.246.151.83 182.72.180.14