Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.57.145.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.57.145.9.			IN	A

;; AUTHORITY SECTION:
.			196	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061503 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 16 07:33:54 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 9.145.57.45.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 45.57.145.9.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
41.131.119.107 attackspam
Nov  3 09:42:11 XXX sshd[371]: Invalid user spark from 41.131.119.107 port 50252
2019-11-03 22:10:07
103.114.104.53 attackspambots
Nov  3 12:44:13 lcl-usvr-02 sshd[27961]: Invalid user admin from 103.114.104.53 port 65256
...
2019-11-03 22:02:52
218.17.185.45 attack
$f2bV_matches
2019-11-03 22:30:54
123.206.22.145 attackbots
Nov  3 08:07:47 lnxmail61 sshd[8713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.22.145
2019-11-03 22:19:19
94.191.31.53 attackspam
Automatic report - Banned IP Access
2019-11-03 22:27:18
198.108.66.32 attackspambots
Connection by 198.108.66.32 on port: 502 got caught by honeypot at 11/3/2019 4:43:50 AM
2019-11-03 22:16:20
113.59.166.119 attack
Automatic report - Banned IP Access
2019-11-03 21:54:41
211.150.70.18 attackspambots
14 pkts, ports: UDP:53, TCP:7548, TCP:2628, TCP:10001, UDP:64738, UDP:30718, TCP:2525, TCP:8087, TCP:5555, TCP:1025, TCP:10443, TCP:3001, UDP:2638, UDP:5008
2019-11-03 22:26:55
45.141.84.38 attackspam
2019-11-03T13:56:59.339713mail01 postfix/smtpd[14711]: warning: unknown[45.141.84.38]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-03T13:59:28.241323mail01 postfix/smtpd[28662]: warning: unknown[45.141.84.38]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-03T14:06:47.227465mail01 postfix/smtpd[15038]: warning: unknown[45.141.84.38]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-03 22:11:46
80.211.129.34 attack
Nov  2 19:55:37 sachi sshd\[6927\]: Invalid user Patches from 80.211.129.34
Nov  2 19:55:37 sachi sshd\[6927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.129.34
Nov  2 19:55:39 sachi sshd\[6927\]: Failed password for invalid user Patches from 80.211.129.34 port 56768 ssh2
Nov  2 19:59:38 sachi sshd\[7259\]: Invalid user wty from 80.211.129.34
Nov  2 19:59:38 sachi sshd\[7259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.129.34
2019-11-03 22:06:12
168.227.255.254 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/168.227.255.254/ 
 
 AR - 1H : (54)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AR 
 NAME ASN : ASN263777 
 
 IP : 168.227.255.254 
 
 CIDR : 168.227.254.0/23 
 
 PREFIX COUNT : 10 
 
 UNIQUE IP COUNT : 3072 
 
 
 ATTACKS DETECTED ASN263777 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-03 06:44:13 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-03 22:02:02
219.92.16.81 attack
$f2bV_matches
2019-11-03 22:25:24
59.48.117.70 attackbots
Port 1433 Scan
2019-11-03 22:06:31
124.42.99.11 attack
Nov  3 20:29:08 webhost01 sshd[5260]: Failed password for root from 124.42.99.11 port 56070 ssh2
...
2019-11-03 21:57:35
51.38.224.46 attackbots
Nov  3 08:31:09 localhost sshd[18888]: Failed password for root from 51.38.224.46 port 50906 ssh2
Nov  3 08:34:37 localhost sshd[18979]: Invalid user locamex from 51.38.224.46 port 60566
Nov  3 08:34:37 localhost sshd[18979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.224.46 
Nov  3 08:34:37 localhost sshd[18979]: Invalid user locamex from 51.38.224.46 port 60566
Nov  3 08:34:39 localhost sshd[18979]: Failed password for invalid user locamex from 51.38.224.46 port 60566 ssh2
2019-11-03 21:48:51

Recently Reported IPs

221.230.222.17 83.15.77.228 47.108.26.99 45.55.238.214
92.124.4.24 23.236.187.165 35.199.16.154 216.107.207.78
45.190.28.36 180.76.210.138 221.230.220.169 171.5.223.98
193.233.140.254 45.39.255.117 37.255.240.29 38.7.130.155
38.9.162.36 39.72.98.14 39.72.99.48 39.72.99.94