Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Clifton

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: DigitalOcean, LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.55.52.145 attackspambots
fail2ban detected bruce force on ssh iptables
2020-10-13 01:42:53
45.55.52.145 attack
Oct 12 08:11:35 xeon sshd[43682]: Failed password for root from 45.55.52.145 port 43538 ssh2
2020-10-12 17:05:41
45.55.52.145 attack
SSH Invalid Login
2020-10-07 07:12:43
45.55.52.145 attack
sshd: Failed password for .... from 45.55.52.145 port 12902 ssh2 (8 attempts)
2020-10-06 23:33:51
45.55.52.145 attackbotsspam
Oct  6 06:49:04 jumpserver sshd[520203]: Failed password for root from 45.55.52.145 port 45042 ssh2
Oct  6 06:53:10 jumpserver sshd[520308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.52.145  user=root
Oct  6 06:53:11 jumpserver sshd[520308]: Failed password for root from 45.55.52.145 port 43301 ssh2
...
2020-10-06 15:22:48
45.55.52.13 attack
WordPress brute force
2020-06-04 05:14:28
45.55.52.223 attackspam
Unauthorized connection attempt detected, IP banned.
2020-03-01 09:28:18
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.55.52.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15349
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.55.52.216.			IN	A

;; AUTHORITY SECTION:
.			3574	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019043000 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed May 01 00:36:11 +08 2019
;; MSG SIZE  rcvd: 116

Host info
Host 216.52.55.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 216.52.55.45.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
62.197.103.12 attackbotsspam
Nov 26 01:04:49 meumeu sshd[14912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.197.103.12 
Nov 26 01:04:51 meumeu sshd[14912]: Failed password for invalid user nataraja from 62.197.103.12 port 12641 ssh2
Nov 26 01:10:55 meumeu sshd[15750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.197.103.12 
...
2019-12-01 07:53:56
189.210.114.135 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-01 07:32:34
217.61.121.48 attack
Invalid user langenberg from 217.61.121.48 port 59346
2019-12-01 07:43:26
106.13.48.201 attackbots
Nov 30 23:29:48 root sshd[20819]: Failed password for root from 106.13.48.201 port 43158 ssh2
Nov 30 23:33:32 root sshd[20869]: Failed password for root from 106.13.48.201 port 45990 ssh2
Nov 30 23:41:01 root sshd[20978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.201 
...
2019-12-01 07:36:35
105.73.80.184 attackspambots
Nov 30 13:38:29 php1 sshd\[11887\]: Invalid user hanem from 105.73.80.184
Nov 30 13:38:29 php1 sshd\[11887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.73.80.184
Nov 30 13:38:31 php1 sshd\[11887\]: Failed password for invalid user hanem from 105.73.80.184 port 21351 ssh2
Nov 30 13:41:36 php1 sshd\[12245\]: Invalid user marui from 105.73.80.184
Nov 30 13:41:36 php1 sshd\[12245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.73.80.184
2019-12-01 07:42:45
49.234.48.86 attackbots
Invalid user aini from 49.234.48.86 port 35626
2019-12-01 07:53:43
212.232.37.224 attackspambots
Automatic report - Port Scan Attack
2019-12-01 07:51:46
1.71.129.210 attack
2019-11-30T23:14:14.920431abusebot-5.cloudsearch.cf sshd\[12899\]: Invalid user guest from 1.71.129.210 port 48597
2019-12-01 07:26:24
218.92.0.184 attack
2019-12-01T00:39:39.652381ns386461 sshd\[4095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
2019-12-01T00:39:41.335957ns386461 sshd\[4095\]: Failed password for root from 218.92.0.184 port 65045 ssh2
2019-12-01T00:39:44.664968ns386461 sshd\[4095\]: Failed password for root from 218.92.0.184 port 65045 ssh2
2019-12-01T00:39:47.738564ns386461 sshd\[4095\]: Failed password for root from 218.92.0.184 port 65045 ssh2
2019-12-01T00:39:51.221851ns386461 sshd\[4095\]: Failed password for root from 218.92.0.184 port 65045 ssh2
...
2019-12-01 07:46:08
78.188.21.128 attackbots
Unauthorised access (Dec  1) SRC=78.188.21.128 LEN=44 TTL=52 ID=26250 TCP DPT=23 WINDOW=44189 SYN
2019-12-01 07:55:16
37.187.54.67 attackspam
Fail2Ban - SSH Bruteforce Attempt
2019-12-01 07:20:47
112.85.42.174 attackbots
Dec  1 00:49:43 MK-Soft-VM7 sshd[8230]: Failed password for root from 112.85.42.174 port 3439 ssh2
Dec  1 00:49:48 MK-Soft-VM7 sshd[8230]: Failed password for root from 112.85.42.174 port 3439 ssh2
...
2019-12-01 07:51:04
49.69.241.178 attackspambots
Sep  9 22:38:27 meumeu sshd[15705]: Failed password for root from 49.69.241.178 port 37898 ssh2
Sep  9 22:38:44 meumeu sshd[15705]: Failed password for root from 49.69.241.178 port 37898 ssh2
Sep  9 22:38:49 meumeu sshd[15705]: Failed password for root from 49.69.241.178 port 37898 ssh2
Sep  9 22:38:49 meumeu sshd[15705]: error: maximum authentication attempts exceeded for root from 49.69.241.178 port 37898 ssh2 [preauth]
...
2019-12-01 07:34:52
138.97.65.4 attack
2019-11-30T23:12:23.435420abusebot.cloudsearch.cf sshd\[19503\]: Invalid user giribes from 138.97.65.4 port 36006
2019-12-01 07:16:33
35.188.242.129 attack
Dec  1 00:15:04 ns381471 sshd[22274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.188.242.129
Dec  1 00:15:06 ns381471 sshd[22274]: Failed password for invalid user dbus from 35.188.242.129 port 41784 ssh2
2019-12-01 07:21:49

Recently Reported IPs

60.252.149.59 197.48.151.114 178.185.223.91 179.199.177.153
122.52.131.249 163.229.240.184 148.132.95.78 117.85.72.121
8.133.42.55 28.229.63.57 62.145.207.69 59.240.155.230
190.207.65.174 100.44.158.225 156.219.222.24 76.231.92.205
104.192.74.20 1.63.222.216 68.183.71.40 85.15.176.22