Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.72.55.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23189
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.72.55.94.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100601 1800 900 604800 86400

;; Query time: 175 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 04:05:23 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 94.55.72.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 94.55.72.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.248.168.112 attackspam
" "
2020-09-28 02:11:04
91.204.248.42 attackbots
Sep 27 17:14:06 lavrea sshd[18761]: Invalid user bso from 91.204.248.42 port 53632
...
2020-09-28 02:18:34
103.233.1.167 attack
103.233.1.167 - - [27/Sep/2020:18:14:29 +0100] "POST /wp-login.php HTTP/1.1" 200 2384 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.233.1.167 - - [27/Sep/2020:18:14:31 +0100] "POST /wp-login.php HTTP/1.1" 200 2320 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.233.1.167 - - [27/Sep/2020:18:14:32 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-28 01:56:19
122.51.91.131 attackbotsspam
Automatic report - Banned IP Access
2020-09-28 02:10:43
106.12.151.250 attack
Sep 27 19:28:34 ns382633 sshd\[29484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.151.250  user=root
Sep 27 19:28:36 ns382633 sshd\[29484\]: Failed password for root from 106.12.151.250 port 35036 ssh2
Sep 27 19:47:38 ns382633 sshd\[919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.151.250  user=root
Sep 27 19:47:39 ns382633 sshd\[919\]: Failed password for root from 106.12.151.250 port 58284 ssh2
Sep 27 19:57:11 ns382633 sshd\[2788\]: Invalid user cmsuser from 106.12.151.250 port 42660
Sep 27 19:57:11 ns382633 sshd\[2788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.151.250
2020-09-28 02:09:44
159.65.222.105 attackbots
Sep 27 17:48:46 gitlab sshd[1589618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.222.105 
Sep 27 17:48:46 gitlab sshd[1589618]: Invalid user elastic from 159.65.222.105 port 59672
Sep 27 17:48:48 gitlab sshd[1589618]: Failed password for invalid user elastic from 159.65.222.105 port 59672 ssh2
Sep 27 17:52:25 gitlab sshd[1590166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.222.105  user=root
Sep 27 17:52:27 gitlab sshd[1590166]: Failed password for root from 159.65.222.105 port 36798 ssh2
...
2020-09-28 02:19:27
218.92.0.223 attack
Sep 27 19:54:06 OPSO sshd\[14437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223  user=root
Sep 27 19:54:08 OPSO sshd\[14437\]: Failed password for root from 218.92.0.223 port 26535 ssh2
Sep 27 19:54:12 OPSO sshd\[14437\]: Failed password for root from 218.92.0.223 port 26535 ssh2
Sep 27 19:54:14 OPSO sshd\[14437\]: Failed password for root from 218.92.0.223 port 26535 ssh2
Sep 27 19:54:18 OPSO sshd\[14437\]: Failed password for root from 218.92.0.223 port 26535 ssh2
2020-09-28 01:59:01
192.241.239.146 attackbotsspam
 TCP (SYN) 192.241.239.146:38991 -> port 18245, len 44
2020-09-28 02:03:40
200.87.211.104 attack
200.87.211.104 - - \[26/Sep/2020:13:35:21 -0700\] "POST /index.php/admin/index/ HTTP/1.1" 404 20435200.87.211.104 - - \[26/Sep/2020:13:35:21 -0700\] "POST /index.php/admin/sales_order/ HTTP/1.1" 404 20459200.87.211.104 - - \[26/Sep/2020:13:35:21 -0700\] "POST /index.php/admin HTTP/1.1" 404 20407
...
2020-09-28 02:06:30
152.32.223.197 attack
152.32.223.197 (VN/Vietnam/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 27 18:15:09 server2 sshd[15401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.223.197  user=root
Sep 27 18:10:19 server2 sshd[14394]: Failed password for root from 91.132.103.85 port 38216 ssh2
Sep 27 18:10:51 server2 sshd[14550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.193.164  user=root
Sep 27 18:12:52 server2 sshd[14983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.245.15  user=root
Sep 27 18:12:54 server2 sshd[14983]: Failed password for root from 95.111.245.15 port 37826 ssh2

IP Addresses Blocked:
2020-09-28 02:15:55
112.85.42.180 attackbotsspam
Sep 27 19:52:45 abendstille sshd\[12074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180  user=root
Sep 27 19:52:47 abendstille sshd\[12074\]: Failed password for root from 112.85.42.180 port 16294 ssh2
Sep 27 19:52:50 abendstille sshd\[12074\]: Failed password for root from 112.85.42.180 port 16294 ssh2
Sep 27 19:53:00 abendstille sshd\[12074\]: Failed password for root from 112.85.42.180 port 16294 ssh2
Sep 27 19:53:04 abendstille sshd\[12342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180  user=root
...
2020-09-28 01:58:03
167.114.103.140 attackbots
bruteforce detected
2020-09-28 02:22:51
89.39.107.209 attackbots
0,17-01/28 [bc01/m21] PostRequest-Spammer scoring: nairobi
2020-09-28 01:56:44
159.203.30.50 attackspambots
Sep 27 18:49:09 sip sshd[30727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.30.50
Sep 27 18:49:11 sip sshd[30727]: Failed password for invalid user cat from 159.203.30.50 port 49242 ssh2
Sep 27 19:05:32 sip sshd[2695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.30.50
2020-09-28 02:02:18
168.62.174.233 attackspambots
$f2bV_matches
2020-09-28 02:14:23

Recently Reported IPs

125.253.93.158 23.250.48.211 38.15.148.190 158.181.141.163
50.114.111.117 50.114.110.202 187.189.93.217 104.227.162.105
128.90.108.249 191.181.41.244 38.15.153.6 187.200.131.253
187.8.212.10 38.242.214.102 45.72.55.161 154.29.64.208
23.236.222.221 191.96.86.2 139.47.35.97 141.255.159.78