Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.72.55.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63146
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.72.55.114.			IN	A

;; AUTHORITY SECTION:
.			307	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100700 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 08 00:33:27 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 114.55.72.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.55.72.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.212 attackspam
Dec  4 20:36:11 vps691689 sshd[31480]: Failed password for root from 222.186.175.212 port 57258 ssh2
Dec  4 20:36:25 vps691689 sshd[31480]: Failed password for root from 222.186.175.212 port 57258 ssh2
Dec  4 20:36:25 vps691689 sshd[31480]: error: maximum authentication attempts exceeded for root from 222.186.175.212 port 57258 ssh2 [preauth]
...
2019-12-05 03:46:45
139.59.14.239 attack
Dec  4 09:42:35 auw2 sshd\[16457\]: Invalid user wwwadmin from 139.59.14.239
Dec  4 09:42:35 auw2 sshd\[16457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.14.239
Dec  4 09:42:37 auw2 sshd\[16457\]: Failed password for invalid user wwwadmin from 139.59.14.239 port 33406 ssh2
Dec  4 09:49:52 auw2 sshd\[17159\]: Invalid user server from 139.59.14.239
Dec  4 09:49:52 auw2 sshd\[17159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.14.239
2019-12-05 03:50:15
165.227.69.39 attack
20 attempts against mh-ssh on cloud.magehost.pro
2019-12-05 03:27:16
218.92.0.179 attackspambots
SSH Bruteforce attack
2019-12-05 03:34:44
129.158.71.3 attackspambots
Dec  4 19:55:11 web8 sshd\[14858\]: Invalid user bedrijfenre from 129.158.71.3
Dec  4 19:55:11 web8 sshd\[14858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.158.71.3
Dec  4 19:55:13 web8 sshd\[14858\]: Failed password for invalid user bedrijfenre from 129.158.71.3 port 9298 ssh2
Dec  4 20:00:37 web8 sshd\[17561\]: Invalid user denslow from 129.158.71.3
Dec  4 20:00:37 web8 sshd\[17561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.158.71.3
2019-12-05 04:06:00
106.13.4.250 attackbotsspam
Dec  4 20:48:08 vserver sshd\[4899\]: Invalid user kaaren from 106.13.4.250Dec  4 20:48:10 vserver sshd\[4899\]: Failed password for invalid user kaaren from 106.13.4.250 port 43648 ssh2Dec  4 20:53:53 vserver sshd\[4949\]: Invalid user ident from 106.13.4.250Dec  4 20:53:55 vserver sshd\[4949\]: Failed password for invalid user ident from 106.13.4.250 port 49150 ssh2
...
2019-12-05 04:05:33
186.206.131.158 attack
Lines containing failures of 186.206.131.158
Dec  2 18:27:18 MAKserver06 sshd[3678]: Invalid user brivins from 186.206.131.158 port 59598
Dec  2 18:27:18 MAKserver06 sshd[3678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.131.158 
Dec  2 18:27:20 MAKserver06 sshd[3678]: Failed password for invalid user brivins from 186.206.131.158 port 59598 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=186.206.131.158
2019-12-05 03:33:09
198.100.146.98 attack
Dec  4 21:22:51 sauna sshd[51559]: Failed password for root from 198.100.146.98 port 42146 ssh2
...
2019-12-05 03:37:39
159.65.2.246 attack
Dec  4 14:54:47 TORMINT sshd\[25289\]: Invalid user csyac from 159.65.2.246
Dec  4 14:54:47 TORMINT sshd\[25289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.2.246
Dec  4 14:54:50 TORMINT sshd\[25289\]: Failed password for invalid user csyac from 159.65.2.246 port 47092 ssh2
...
2019-12-05 03:55:36
94.191.87.254 attackbotsspam
Dec  4 14:40:33 ny01 sshd[18502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.87.254
Dec  4 14:40:36 ny01 sshd[18502]: Failed password for invalid user test from 94.191.87.254 port 49464 ssh2
Dec  4 14:46:51 ny01 sshd[19149]: Failed password for root from 94.191.87.254 port 55762 ssh2
2019-12-05 03:47:16
218.92.0.160 attackbots
Dec  5 00:55:59 gw1 sshd[21374]: Failed password for root from 218.92.0.160 port 31517 ssh2
Dec  5 00:56:02 gw1 sshd[21374]: Failed password for root from 218.92.0.160 port 31517 ssh2
...
2019-12-05 03:57:12
118.25.126.32 attackspambots
Dec  4 19:35:59 gw1 sshd[8571]: Failed password for daemon from 118.25.126.32 port 55226 ssh2
...
2019-12-05 03:29:30
163.172.206.78 attack
Dec  4 20:27:49 ArkNodeAT sshd\[6345\]: Invalid user ftpsecure from 163.172.206.78
Dec  4 20:27:49 ArkNodeAT sshd\[6345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.206.78
Dec  4 20:27:51 ArkNodeAT sshd\[6345\]: Failed password for invalid user ftpsecure from 163.172.206.78 port 35060 ssh2
2019-12-05 04:04:48
115.159.86.75 attackspambots
Dec  4 21:46:27 sauna sshd[52335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.86.75
Dec  4 21:46:29 sauna sshd[52335]: Failed password for invalid user ytooga from 115.159.86.75 port 38741 ssh2
...
2019-12-05 03:57:56
118.25.129.144 attackspambots
2019-12-04T20:21:02.121630  sshd[17669]: Invalid user backup from 118.25.129.144 port 57888
2019-12-04T20:21:02.135902  sshd[17669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.129.144
2019-12-04T20:21:02.121630  sshd[17669]: Invalid user backup from 118.25.129.144 port 57888
2019-12-04T20:21:03.799888  sshd[17669]: Failed password for invalid user backup from 118.25.129.144 port 57888 ssh2
2019-12-04T20:27:56.930839  sshd[17787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.129.144  user=sshd
2019-12-04T20:27:59.096656  sshd[17787]: Failed password for sshd from 118.25.129.144 port 39104 ssh2
...
2019-12-05 03:56:25

Recently Reported IPs

74.84.150.70 179.133.168.80 205.178.16.2 154.29.64.226
38.15.153.101 158.101.7.19 192.241.216.139 201.26.80.117
123.245.14.228 102.33.124.170 102.33.124.128 20.249.210.166
43.153.104.88 217.160.101.172 113.6.47.196 219.75.123.60
120.46.158.166 111.19.191.67 194.147.142.183 178.62.75.68