Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Imbituba

Region: Santa Catarina

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.70.150.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63255
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.70.150.112.			IN	A

;; AUTHORITY SECTION:
.			576	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020093002 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 01 09:45:46 CST 2020
;; MSG SIZE  rcvd: 117
Host info
112.150.70.45.in-addr.arpa domain name pointer 45-70-150-112.shfibra.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
112.150.70.45.in-addr.arpa	name = 45-70-150-112.shfibra.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.230.228.113 attackspam
Aug 20 16:46:30 lnxded64 sshd[24510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.228.113
2019-08-21 06:47:47
49.88.112.90 attack
Aug 20 22:45:34 localhost sshd\[24519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.90  user=root
Aug 20 22:45:36 localhost sshd\[24519\]: Failed password for root from 49.88.112.90 port 63568 ssh2
Aug 20 22:45:38 localhost sshd\[24519\]: Failed password for root from 49.88.112.90 port 63568 ssh2
...
2019-08-21 06:47:12
190.246.155.29 attack
Aug 20 17:34:11 aat-srv002 sshd[30402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.246.155.29
Aug 20 17:34:14 aat-srv002 sshd[30402]: Failed password for invalid user ts3 from 190.246.155.29 port 60601 ssh2
Aug 20 17:39:27 aat-srv002 sshd[30540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.246.155.29
Aug 20 17:39:29 aat-srv002 sshd[30540]: Failed password for invalid user devel from 190.246.155.29 port 55512 ssh2
...
2019-08-21 06:59:47
106.12.125.27 attackbots
Triggered by Fail2Ban at Ares web server
2019-08-21 07:23:20
88.123.13.140 attackbotsspam
Automatic report - Port Scan Attack
2019-08-21 07:17:35
167.71.64.9 attack
[ssh] SSH attack
2019-08-21 07:19:58
5.148.3.212 attack
Invalid user temp from 5.148.3.212 port 58578
2019-08-21 07:08:45
134.249.123.118 attack
Invalid user upload from 134.249.123.118 port 45858
2019-08-21 07:10:04
102.65.158.35 attack
Aug 20 11:09:32 indra sshd[880603]: Invalid user ase from 102.65.158.35
Aug 20 11:09:32 indra sshd[880603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102-65-158-35.dsl.web.africa 
Aug 20 11:09:34 indra sshd[880603]: Failed password for invalid user ase from 102.65.158.35 port 48084 ssh2
Aug 20 11:09:34 indra sshd[880603]: Received disconnect from 102.65.158.35: 11: Bye Bye [preauth]
Aug 20 11:23:05 indra sshd[884266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102-65-158-35.dsl.web.africa  user=r.r
Aug 20 11:23:07 indra sshd[884266]: Failed password for r.r from 102.65.158.35 port 47380 ssh2
Aug 20 11:23:07 indra sshd[884266]: Received disconnect from 102.65.158.35: 11: Bye Bye [preauth]
Aug 20 11:28:27 indra sshd[885186]: Invalid user kass from 102.65.158.35
Aug 20 11:28:27 indra sshd[885186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost........
-------------------------------
2019-08-21 07:10:51
49.50.87.77 attack
[ssh] SSH attack
2019-08-21 07:04:32
46.105.137.251 attackspambots
$f2bV_matches
2019-08-21 07:12:25
147.135.210.187 attackspambots
SSH Brute-Force attacks
2019-08-21 07:11:56
51.83.46.16 attackbotsspam
Invalid user apidoc from 51.83.46.16 port 35750
2019-08-21 06:49:40
196.35.41.86 attack
Automatic report - Banned IP Access
2019-08-21 06:49:06
79.17.4.197 attackspambots
2019-08-20T18:56:18.785543Z 604d89f2b269 New connection: 79.17.4.197:52528 (172.17.0.2:2222) [session: 604d89f2b269]
2019-08-20T19:00:48.640740Z 4dcbe9df811d New connection: 79.17.4.197:36810 (172.17.0.2:2222) [session: 4dcbe9df811d]
2019-08-21 07:02:18

Recently Reported IPs

153.213.227.117 90.18.146.246 91.37.179.200 92.78.37.101
62.19.92.250 156.209.114.71 90.120.94.213 90.127.0.188
204.177.250.76 101.185.171.145 164.51.221.30 69.38.163.139
1.25.38.81 52.170.83.245 190.205.53.46 209.99.202.122
185.63.153.124 32.230.31.18 177.216.219.227 114.161.75.182