Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Las Vegas

Region: Nevada

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.61.149.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20962
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.61.149.165.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025111700 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 17 14:30:34 CST 2025
;; MSG SIZE  rcvd: 106
Host info
165.149.61.45.in-addr.arpa domain name pointer 165.149.61.45.static.cloudzy.com.
Nslookup info:
b'165.149.61.45.in-addr.arpa	name = 165.149.61.45.static.cloudzy.com.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
212.70.149.52 attack
2020-09-04 14:19:05,414 fail2ban.actions        [18715]: NOTICE  [postfix-sasl] Ban 212.70.149.52
2020-09-04 16:21:25,651 fail2ban.actions        [18715]: NOTICE  [postfix-sasl] Ban 212.70.149.52
2020-09-04 18:23:48,731 fail2ban.actions        [18715]: NOTICE  [postfix-sasl] Ban 212.70.149.52
2020-09-04 20:26:07,423 fail2ban.actions        [18715]: NOTICE  [postfix-sasl] Ban 212.70.149.52
2020-09-04 22:28:25,463 fail2ban.actions        [18715]: NOTICE  [postfix-sasl] Ban 212.70.149.52
2020-09-09 21:54:02
2001:678:76c:3760:145:131:25:240 attackbots
Unauthorised access to wp-admin
2020-09-09 22:34:52
47.99.198.122 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-09 22:34:09
116.247.81.99 attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-09T08:05:38Z and 2020-09-09T08:19:49Z
2020-09-09 22:20:33
159.65.229.200 attack
Sep  9 10:00:02 inter-technics sshd[31350]: Invalid user mimimg from 159.65.229.200 port 45510
Sep  9 10:00:02 inter-technics sshd[31350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.229.200
Sep  9 10:00:02 inter-technics sshd[31350]: Invalid user mimimg from 159.65.229.200 port 45510
Sep  9 10:00:05 inter-technics sshd[31350]: Failed password for invalid user mimimg from 159.65.229.200 port 45510 ssh2
Sep  9 10:03:16 inter-technics sshd[31501]: Invalid user ogp_agent from 159.65.229.200 port 50026
...
2020-09-09 22:00:29
192.35.168.219 attackbotsspam
Unauthorized connection attempt from IP address 192.35.168.219 on Port 465(SMTPS)
2020-09-09 22:10:13
157.44.175.149 attackbotsspam
1599583990 - 09/08/2020 18:53:10 Host: 157.44.175.149/157.44.175.149 Port: 445 TCP Blocked
...
2020-09-09 22:14:03
207.155.193.201 attack
port scan and connect, tcp 443 (https)
2020-09-09 22:31:21
101.37.78.214 attackspam
...
2020-09-09 22:11:14
138.186.156.84 attack
20/9/8@14:40:02: FAIL: Alarm-Network address from=138.186.156.84
20/9/8@14:40:02: FAIL: Alarm-Network address from=138.186.156.84
...
2020-09-09 21:57:39
82.212.129.252 attackbotsspam
2020-09-09T03:49:19.923886mail.standpoint.com.ua sshd[21909]: Invalid user mgts from 82.212.129.252 port 39825
2020-09-09T03:49:19.926356mail.standpoint.com.ua sshd[21909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-82-212-129-252.dynamic.voo.be
2020-09-09T03:49:19.923886mail.standpoint.com.ua sshd[21909]: Invalid user mgts from 82.212.129.252 port 39825
2020-09-09T03:49:21.699995mail.standpoint.com.ua sshd[21909]: Failed password for invalid user mgts from 82.212.129.252 port 39825 ssh2
2020-09-09T03:52:57.416850mail.standpoint.com.ua sshd[22360]: Invalid user lindsay from 82.212.129.252 port 43060
...
2020-09-09 22:25:01
128.199.247.130 attackbotsspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-09 22:00:46
186.10.245.152 attackspambots
[ssh] SSH attack
2020-09-09 21:58:50
5.110.23.155 attackspambots
Attempted Email Sync. Password Hacking/Probing.
2020-09-09 22:35:24
2001:b011:8004:4504:d84a:b9b6:d089:41cf attackbots
Attempted Email Sync. Password Hacking/Probing.
2020-09-09 22:37:02

Recently Reported IPs

113.18.200.1 113.18.25.1 110.237.0.1 110.237.10.10
103.177.33.46 182.71.241.63 182.71.241.163 211.156.195.246
74.7.230.8 74.7.227.127 169.34.149.162 169.34.149.157
169.34.149.237 34.13.218.102 14.220.184.134 223.104.69.82
34.105.70.236 121.127.233.95 113.215.188.245 193.36.237.163