Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Toronto

Region: Ontario

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.72.140.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.72.140.42.			IN	A

;; AUTHORITY SECTION:
.			566	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032601 1800 900 604800 86400

;; Query time: 84 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 05:56:27 CST 2020
;; MSG SIZE  rcvd: 116
Host info
42.140.72.45.in-addr.arpa domain name pointer 45-72-140-42.cpe.teksavvy.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.140.72.45.in-addr.arpa	name = 45-72-140-42.cpe.teksavvy.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.38.150.188 attackbots
Jun 13 14:27:48 mail postfix/smtpd\[9944\]: warning: unknown\[46.38.150.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 13 14:29:22 mail postfix/smtpd\[9720\]: warning: unknown\[46.38.150.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 13 14:30:49 mail postfix/smtpd\[9944\]: warning: unknown\[46.38.150.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 13 15:01:25 mail postfix/smtpd\[11381\]: warning: unknown\[46.38.150.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-06-13 21:02:53
123.136.128.13 attackspam
2020-06-13T14:28:44.4266301240 sshd\[9685\]: Invalid user ydadmin from 123.136.128.13 port 34208
2020-06-13T14:28:44.4303941240 sshd\[9685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.136.128.13
2020-06-13T14:28:46.6486431240 sshd\[9685\]: Failed password for invalid user ydadmin from 123.136.128.13 port 34208 ssh2
...
2020-06-13 20:39:19
85.192.138.149 attackbots
Jun 13 05:59:38 dignus sshd[9466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.192.138.149  user=root
Jun 13 05:59:40 dignus sshd[9466]: Failed password for root from 85.192.138.149 port 56386 ssh2
Jun 13 06:03:29 dignus sshd[9837]: Invalid user zabbix from 85.192.138.149 port 56164
Jun 13 06:03:29 dignus sshd[9837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.192.138.149
Jun 13 06:03:31 dignus sshd[9837]: Failed password for invalid user zabbix from 85.192.138.149 port 56164 ssh2
...
2020-06-13 21:11:03
186.122.149.144 attackspambots
Jun 13 14:25:50 abendstille sshd\[30310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.149.144  user=root
Jun 13 14:25:52 abendstille sshd\[30310\]: Failed password for root from 186.122.149.144 port 36488 ssh2
Jun 13 14:28:45 abendstille sshd\[603\]: Invalid user demo from 186.122.149.144
Jun 13 14:28:45 abendstille sshd\[603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.149.144
Jun 13 14:28:47 abendstille sshd\[603\]: Failed password for invalid user demo from 186.122.149.144 port 46238 ssh2
...
2020-06-13 20:38:09
222.186.175.163 attackbotsspam
Jun 13 14:50:40 vpn01 sshd[18843]: Failed password for root from 222.186.175.163 port 11476 ssh2
Jun 13 14:50:43 vpn01 sshd[18843]: Failed password for root from 222.186.175.163 port 11476 ssh2
...
2020-06-13 20:52:31
141.98.9.160 attackspambots
2020-06-13T12:28:24.915498shield sshd\[19176\]: Invalid user user from 141.98.9.160 port 32945
2020-06-13T12:28:24.918553shield sshd\[19176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.160
2020-06-13T12:28:27.056553shield sshd\[19176\]: Failed password for invalid user user from 141.98.9.160 port 32945 ssh2
2020-06-13T12:28:58.773792shield sshd\[19324\]: Invalid user guest from 141.98.9.160 port 43493
2020-06-13T12:28:58.778417shield sshd\[19324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.160
2020-06-13 20:31:30
77.42.93.172 attackbotsspam
Automatic report - Port Scan Attack
2020-06-13 20:45:46
157.245.81.172 attack
3389BruteforceStormFW21
2020-06-13 21:03:27
138.19.115.47 attackspam
2020-06-13T14:22:04.527046vps751288.ovh.net sshd\[29456\]: Invalid user squires from 138.19.115.47 port 43632
2020-06-13T14:22:04.536674vps751288.ovh.net sshd\[29456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138019115047.ctinets.com
2020-06-13T14:22:05.845790vps751288.ovh.net sshd\[29456\]: Failed password for invalid user squires from 138.19.115.47 port 43632 ssh2
2020-06-13T14:28:22.210976vps751288.ovh.net sshd\[29508\]: Invalid user kyw from 138.19.115.47 port 45140
2020-06-13T14:28:22.219342vps751288.ovh.net sshd\[29508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138019115047.ctinets.com
2020-06-13 21:04:41
54.37.138.225 attackspam
2020-06-13T14:25:12.627895sd-86998 sshd[48949]: Invalid user guest from 54.37.138.225 port 38932
2020-06-13T14:25:12.632971sd-86998 sshd[48949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=225.ip-54-37-138.eu
2020-06-13T14:25:12.627895sd-86998 sshd[48949]: Invalid user guest from 54.37.138.225 port 38932
2020-06-13T14:25:14.414890sd-86998 sshd[48949]: Failed password for invalid user guest from 54.37.138.225 port 38932 ssh2
2020-06-13T14:28:45.194452sd-86998 sshd[488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=225.ip-54-37-138.eu  user=root
2020-06-13T14:28:47.889788sd-86998 sshd[488]: Failed password for root from 54.37.138.225 port 40634 ssh2
...
2020-06-13 20:39:35
104.248.143.46 attackbots
10 attempts against mh-misc-ban on heat
2020-06-13 20:33:23
45.134.179.57 attackbotsspam
Jun 13 14:28:42 debian-2gb-nbg1-2 kernel: \[14310039.450821\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.134.179.57 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=40887 PROTO=TCP SPT=47506 DPT=61800 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-13 20:43:01
85.105.111.240 attack
DATE:2020-06-13 14:28:33, IP:85.105.111.240, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-06-13 20:50:02
98.0.174.246 attack
20/6/13@08:28:27: FAIL: Alarm-Network address from=98.0.174.246
...
2020-06-13 20:59:35
49.88.112.88 attackbots
Unauthorized connection attempt detected from IP address 49.88.112.88 to port 22 [T]
2020-06-13 20:42:05

Recently Reported IPs

204.210.229.71 2.38.181.39 24.228.202.0 69.217.184.168
88.98.56.25 173.124.209.35 46.106.171.42 194.118.199.83
49.166.251.132 184.81.72.158 178.159.135.190 108.80.47.224
67.207.82.196 116.65.212.207 76.25.54.6 193.143.214.68
90.142.6.26 177.0.4.72 115.248.132.36 243.232.116.103