Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.75.195.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29441
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.75.195.141.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 22:43:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 141.195.75.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 141.195.75.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
206.189.47.166 attack
2020-06-22T06:10:53.627252shield sshd\[11140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.47.166  user=root
2020-06-22T06:10:55.115503shield sshd\[11140\]: Failed password for root from 206.189.47.166 port 59564 ssh2
2020-06-22T06:14:09.411607shield sshd\[11434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.47.166  user=root
2020-06-22T06:14:11.808047shield sshd\[11434\]: Failed password for root from 206.189.47.166 port 48406 ssh2
2020-06-22T06:17:25.201258shield sshd\[11665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.47.166  user=root
2020-06-22 14:50:39
210.245.110.9 attackbots
Failed password for invalid user dev from 210.245.110.9 port 57747 ssh2
2020-06-22 14:32:01
31.5.34.204 attackspam
Automatic report - XMLRPC Attack
2020-06-22 14:35:30
54.39.98.253 attackspambots
Invalid user wx from 54.39.98.253 port 56316
2020-06-22 14:42:07
159.89.133.144 attackspam
" "
2020-06-22 14:40:59
187.178.145.227 attack
Brute-Force
2020-06-22 14:45:17
62.215.44.113 attackspambots
Failed password for invalid user kannel from 62.215.44.113 port 47416 ssh2
2020-06-22 14:25:42
61.177.172.61 attackspam
Jun 22 08:49:12 vps sshd[923266]: Failed password for root from 61.177.172.61 port 20109 ssh2
Jun 22 08:49:16 vps sshd[923266]: Failed password for root from 61.177.172.61 port 20109 ssh2
Jun 22 08:49:19 vps sshd[923266]: Failed password for root from 61.177.172.61 port 20109 ssh2
Jun 22 08:49:22 vps sshd[923266]: Failed password for root from 61.177.172.61 port 20109 ssh2
Jun 22 08:49:24 vps sshd[923266]: Failed password for root from 61.177.172.61 port 20109 ssh2
...
2020-06-22 14:53:43
123.207.99.189 attackspam
Jun 22 03:53:27 scw-tender-jepsen sshd[32466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.99.189
Jun 22 03:53:29 scw-tender-jepsen sshd[32466]: Failed password for invalid user mother from 123.207.99.189 port 44656 ssh2
2020-06-22 14:21:48
106.54.110.44 attack
Jun 22 06:43:40 game-panel sshd[7082]: Failed password for root from 106.54.110.44 port 36474 ssh2
Jun 22 06:46:55 game-panel sshd[7237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.110.44
Jun 22 06:46:57 game-panel sshd[7237]: Failed password for invalid user zxl from 106.54.110.44 port 57064 ssh2
2020-06-22 14:47:20
192.99.4.145 attackbotsspam
Jun 22 05:04:13 l02a sshd[21274]: Invalid user hadoop from 192.99.4.145
Jun 22 05:04:13 l02a sshd[21274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=iris8.alt-itc.ca 
Jun 22 05:04:13 l02a sshd[21274]: Invalid user hadoop from 192.99.4.145
Jun 22 05:04:15 l02a sshd[21274]: Failed password for invalid user hadoop from 192.99.4.145 port 55420 ssh2
2020-06-22 14:29:25
49.48.120.3 attack
1592798003 - 06/22/2020 05:53:23 Host: 49.48.120.3/49.48.120.3 Port: 445 TCP Blocked
2020-06-22 14:27:46
49.234.196.215 attackbotsspam
Jun 22 00:53:09 vps46666688 sshd[15849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.196.215
Jun 22 00:53:11 vps46666688 sshd[15849]: Failed password for invalid user zzk from 49.234.196.215 port 51636 ssh2
...
2020-06-22 14:40:27
104.244.76.189 attackbots
no
2020-06-22 14:49:55
103.54.29.167 attackspam
ssh brute force
2020-06-22 14:22:34

Recently Reported IPs

160.37.142.147 216.10.253.46 245.197.23.59 193.199.106.79
30.225.214.7 222.198.149.35 38.213.93.81 199.112.76.159
193.220.175.12 116.245.168.209 229.163.117.146 247.105.203.3
229.52.60.155 239.55.185.124 136.23.162.112 226.46.16.97
130.240.122.181 202.104.152.52 63.254.93.178 222.105.1.189