Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.64.129.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26163
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.64.129.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 09:40:02 CST 2025
;; MSG SIZE  rcvd: 106
Host info
145.129.64.45.in-addr.arpa domain name pointer smtp.umquhile.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.129.64.45.in-addr.arpa	name = smtp.umquhile.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
114.39.54.59 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-29 19:54:18
159.89.162.118 attack
Aug 29 13:32:07 eventyay sshd[15678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.162.118
Aug 29 13:32:08 eventyay sshd[15678]: Failed password for invalid user qd from 159.89.162.118 port 59908 ssh2
Aug 29 13:36:59 eventyay sshd[16920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.162.118
...
2019-08-29 19:53:51
202.29.210.74 attackbotsspam
WordPress XMLRPC scan :: 202.29.210.74 0.128 BYPASS [29/Aug/2019:19:27:54  1000] www.[censored_1] "POST /xmlrpc.php HTTP/1.1" 200 415 "https://www.[censored_1]/" "PHP/7.3.11"
2019-08-29 19:33:12
139.199.186.58 attackbotsspam
Aug 29 13:36:34 vps691689 sshd[31939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.186.58
Aug 29 13:36:35 vps691689 sshd[31939]: Failed password for invalid user test10 from 139.199.186.58 port 32918 ssh2
...
2019-08-29 20:00:08
218.92.0.202 attackspam
Aug 29 13:21:59 eventyay sshd[13255]: Failed password for root from 218.92.0.202 port 23337 ssh2
Aug 29 13:23:26 eventyay sshd[13647]: Failed password for root from 218.92.0.202 port 29675 ssh2
...
2019-08-29 19:29:57
185.143.221.187 attackspam
08/29/2019-07:40:33.247372 185.143.221.187 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-29 19:42:02
115.178.24.72 attack
Aug 29 13:36:05 localhost sshd\[19541\]: Invalid user michael from 115.178.24.72 port 52176
Aug 29 13:36:05 localhost sshd\[19541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.178.24.72
Aug 29 13:36:07 localhost sshd\[19541\]: Failed password for invalid user michael from 115.178.24.72 port 52176 ssh2
2019-08-29 19:43:12
59.63.208.191 attackbots
Aug 29 12:30:12 MK-Soft-Root1 sshd\[15257\]: Invalid user erma from 59.63.208.191 port 48848
Aug 29 12:30:12 MK-Soft-Root1 sshd\[15257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.63.208.191
Aug 29 12:30:15 MK-Soft-Root1 sshd\[15257\]: Failed password for invalid user erma from 59.63.208.191 port 48848 ssh2
...
2019-08-29 19:35:31
209.97.128.177 attack
Invalid user fiona from 209.97.128.177 port 47720
2019-08-29 20:07:29
183.111.125.199 attack
2019-08-29T17:28:30.676412enmeeting.mahidol.ac.th sshd\[28918\]: Invalid user admin from 183.111.125.199 port 60032
2019-08-29T17:28:30.694714enmeeting.mahidol.ac.th sshd\[28918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.125.199
2019-08-29T17:28:32.697601enmeeting.mahidol.ac.th sshd\[28918\]: Failed password for invalid user admin from 183.111.125.199 port 60032 ssh2
...
2019-08-29 19:25:18
128.201.200.30 attackspambots
Automatic report - Port Scan Attack
2019-08-29 20:13:33
114.43.76.230 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-29 20:07:52
109.123.112.4 attackbots
Aug 29 09:28:01 work-partkepr sshd\[6090\]: Invalid user jason from 109.123.112.4 port 39674
Aug 29 09:28:01 work-partkepr sshd\[6090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.123.112.4
...
2019-08-29 19:27:36
95.58.194.141 attackspambots
SSH Bruteforce
2019-08-29 19:27:02
114.46.134.79 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-29 20:11:16

Recently Reported IPs

3.71.236.13 251.34.226.102 132.199.235.8 218.199.69.94
236.32.46.44 20.118.112.155 134.236.197.75 255.91.4.111
87.66.68.229 226.119.122.125 55.197.95.255 220.126.128.109
148.208.74.73 161.197.29.10 207.172.165.241 223.224.46.209
28.213.195.166 87.139.2.218 193.129.123.182 77.27.64.146