Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oslo

Region: Oslo

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.8.10.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57767
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.8.10.8.			IN	A

;; AUTHORITY SECTION:
.			480	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030100 1800 900 604800 86400

;; Query time: 164 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 01 22:53:32 CST 2020
;; MSG SIZE  rcvd: 113
Host info
Host 8.10.8.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.10.8.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.76.163.31 attackspam
SSH brute-force attempt
2020-08-10 23:02:56
203.195.175.47 attackspam
Aug 10 14:09:16 ajax sshd[29200]: Failed password for root from 203.195.175.47 port 54462 ssh2
2020-08-10 22:52:11
128.14.230.200 attackspambots
Aug 10 14:15:05 vm0 sshd[10408]: Failed password for root from 128.14.230.200 port 33662 ssh2
...
2020-08-10 22:41:18
5.89.170.17 attackbotsspam
IPS Sensor Hit - Port Scan detected
2020-08-10 22:40:20
211.210.219.71 attack
Lines containing failures of 211.210.219.71
Aug 10 03:37:18 kmh-wsh-001-nbg03 sshd[7702]: Invalid user pi from 211.210.219.71 port 56404
Aug 10 03:37:18 kmh-wsh-001-nbg03 sshd[7700]: Invalid user pi from 211.210.219.71 port 56402
Aug 10 03:37:18 kmh-wsh-001-nbg03 sshd[7702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.210.219.71 
Aug 10 03:37:18 kmh-wsh-001-nbg03 sshd[7700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.210.219.71 
Aug 10 03:37:20 kmh-wsh-001-nbg03 sshd[7702]: Failed password for invalid user pi from 211.210.219.71 port 56404 ssh2
Aug 10 03:37:20 kmh-wsh-001-nbg03 sshd[7700]: Failed password for invalid user pi from 211.210.219.71 port 56402 ssh2
Aug 10 03:37:20 kmh-wsh-001-nbg03 sshd[7702]: Connection closed by invalid user pi 211.210.219.71 port 56404 [preauth]
Aug 10 03:37:20 kmh-wsh-001-nbg03 sshd[7700]: Connection closed by invalid user pi 211.210.219.71 po........
------------------------------
2020-08-10 23:05:02
222.252.21.30 attackbotsspam
Aug 10 14:04:28 haigwepa sshd[3581]: Failed password for root from 222.252.21.30 port 57989 ssh2
...
2020-08-10 22:43:33
54.37.158.218 attackspam
2020-08-10T14:34:42.092199+02:00  sshd[11738]: Failed password for root from 54.37.158.218 port 36836 ssh2
2020-08-10 22:44:48
203.81.78.180 attack
Aug 10 15:55:33 piServer sshd[11967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.81.78.180 
Aug 10 15:55:35 piServer sshd[11967]: Failed password for invalid user QWEqweQWE123! from 203.81.78.180 port 42600 ssh2
Aug 10 15:59:37 piServer sshd[12321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.81.78.180 
...
2020-08-10 22:54:31
212.64.111.18 attack
Aug 10 05:03:08 vm0 sshd[26285]: Failed password for root from 212.64.111.18 port 52422 ssh2
Aug 10 14:06:36 vm0 sshd[9191]: Failed password for root from 212.64.111.18 port 56132 ssh2
...
2020-08-10 23:02:36
80.211.223.121 attackbotsspam
ssh intrusion attempt
2020-08-10 22:44:22
35.240.239.115 attack
xmlrpc attack
2020-08-10 23:08:28
223.218.137.5 attackspambots
Bruteforce detected by fail2ban
2020-08-10 23:10:13
107.180.71.116 attack
107.180.71.116 - - [10/Aug/2020:14:14:57 +0100] "POST /wp-login.php HTTP/1.1" 200 1956 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
107.180.71.116 - - [10/Aug/2020:14:14:59 +0100] "POST /wp-login.php HTTP/1.1" 200 1953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
107.180.71.116 - - [10/Aug/2020:14:14:59 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-10 23:15:17
196.37.111.217 attackbotsspam
2020-08-10T15:18:26.239800vps773228.ovh.net sshd[26483]: Failed password for root from 196.37.111.217 port 46444 ssh2
2020-08-10T15:23:30.740524vps773228.ovh.net sshd[26539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.37.111.217  user=root
2020-08-10T15:23:32.550096vps773228.ovh.net sshd[26539]: Failed password for root from 196.37.111.217 port 56782 ssh2
2020-08-10T15:28:41.256821vps773228.ovh.net sshd[26583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.37.111.217  user=root
2020-08-10T15:28:43.770978vps773228.ovh.net sshd[26583]: Failed password for root from 196.37.111.217 port 38888 ssh2
...
2020-08-10 23:10:48
107.170.254.146 attackspambots
Bruteforce detected by fail2ban
2020-08-10 22:35:55

Recently Reported IPs

50.129.208.3 111.112.33.73 37.198.45.209 43.168.227.88
75.194.224.165 130.0.253.69 64.111.195.145 126.226.43.169
130.43.156.85 38.43.74.41 101.186.207.245 52.18.215.47
128.124.236.68 125.56.43.156 57.62.17.104 113.21.106.178
159.203.166.220 159.192.2.230 175.104.82.75 69.95.4.51