Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.8.134.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1371
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.8.134.77.			IN	A

;; AUTHORITY SECTION:
.			568	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023100202 1800 900 604800 86400

;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 03 08:50:53 CST 2023
;; MSG SIZE  rcvd: 104
Host info
Host 77.134.8.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 77.134.8.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
58.23.174.14 attackspam
Repeated RDP login failures. Last user: Test2
2020-10-03 01:01:49
193.112.52.18 attackspambots
Repeated RDP login failures. Last user: Cathy
2020-10-03 00:57:06
58.246.174.74 attackbotsspam
(sshd) Failed SSH login from 58.246.174.74 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  2 13:41:20 server2 sshd[19045]: Invalid user git from 58.246.174.74 port 19867
Oct  2 13:41:21 server2 sshd[19045]: Failed password for invalid user git from 58.246.174.74 port 19867 ssh2
Oct  2 13:51:17 server2 sshd[20905]: Invalid user proxy from 58.246.174.74 port 35277
Oct  2 13:51:19 server2 sshd[20905]: Failed password for invalid user proxy from 58.246.174.74 port 35277 ssh2
Oct  2 13:54:08 server2 sshd[21424]: Invalid user eas from 58.246.174.74 port 37053
2020-10-03 01:11:27
61.183.144.188 attack
Invalid user guest from 61.183.144.188 port 46552
2020-10-03 01:14:19
106.75.231.107 attackbotsspam
Oct  2 22:27:18 mx sshd[1116664]: Invalid user wp from 106.75.231.107 port 59544
Oct  2 22:27:18 mx sshd[1116664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.231.107 
Oct  2 22:27:18 mx sshd[1116664]: Invalid user wp from 106.75.231.107 port 59544
Oct  2 22:27:21 mx sshd[1116664]: Failed password for invalid user wp from 106.75.231.107 port 59544 ssh2
Oct  2 22:31:45 mx sshd[1116756]: Invalid user chart from 106.75.231.107 port 56470
...
2020-10-03 01:10:49
182.61.36.44 attack
Invalid user vbox from 182.61.36.44 port 53024
2020-10-03 01:30:17
192.241.239.247 attack
 TCP (SYN) 192.241.239.247:43443 -> port 2077, len 44
2020-10-03 01:18:49
152.136.173.58 attackbots
Invalid user ts3server from 152.136.173.58 port 48026
2020-10-03 01:08:56
103.111.81.58 attack
Repeated RDP login failures. Last user: Test1
2020-10-03 01:05:58
94.182.44.178 attackbots
Repeated RDP login failures. Last user: Operador
2020-10-03 01:00:08
24.92.187.245 attackbots
repeated SSH login attempts
2020-10-03 01:06:56
142.93.8.99 attack
Oct  2 14:07:24 firewall sshd[31101]: Invalid user jacky from 142.93.8.99
Oct  2 14:07:26 firewall sshd[31101]: Failed password for invalid user jacky from 142.93.8.99 port 36416 ssh2
Oct  2 14:11:00 firewall sshd[31184]: Invalid user nisec from 142.93.8.99
...
2020-10-03 01:14:46
159.65.222.105 attack
Oct  2 18:26:13 ip106 sshd[22336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.222.105 
Oct  2 18:26:15 ip106 sshd[22336]: Failed password for invalid user julia from 159.65.222.105 port 36788 ssh2
...
2020-10-03 01:04:27
45.119.83.164 attackbotsspam
Oct  2 18:34:50 PorscheCustomer sshd[3529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.83.164
Oct  2 18:34:51 PorscheCustomer sshd[3529]: Failed password for invalid user xutao from 45.119.83.164 port 58496 ssh2
Oct  2 18:40:10 PorscheCustomer sshd[3667]: Failed password for root from 45.119.83.164 port 35980 ssh2
...
2020-10-03 01:19:58
35.232.22.47 attack
35.232.22.47 - - - [02/Oct/2020:10:48:48 +0200] "GET /.env HTTP/1.1" 404 564 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" "-" "-"
2020-10-03 01:33:14

Recently Reported IPs

152.116.116.233 94.229.111.188 208.109.174.7 42.2.31.141
57.220.4.40 144.54.139.231 77.90.185.105 195.25.94.11
220.146.47.189 23.224.97.76 117.193.79.241 37.99.44.146
210.140.183.65 111.22.105.244 210.152.239.249 105.112.112.208
105.112.112.206 105.112.112.109 9.1.16.208 83.198.195.55