Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.81.149.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42341
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.81.149.168.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 15:07:43 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 168.149.81.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.149.81.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
165.227.232.131 attack
Jul 23 13:01:16 srv206 sshd[12623]: Invalid user pio from 165.227.232.131
...
2019-07-23 19:46:19
100.42.48.16 attackspam
Jul 23 10:03:25 mail sshd\[25333\]: Failed password for invalid user chen from 100.42.48.16 port 38518 ssh2
Jul 23 10:20:39 mail sshd\[25669\]: Invalid user christian from 100.42.48.16 port 54627
...
2019-07-23 18:59:52
186.42.127.54 attackspambots
2019-07-23 04:20:08 H=(54.127.42.186.static.anycast.cnt-grms.ec) [186.42.127.54]:45614 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/186.42.127.54)
2019-07-23 04:20:08 H=(54.127.42.186.static.anycast.cnt-grms.ec) [186.42.127.54]:45614 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/186.42.127.54)
2019-07-23 04:20:09 H=(54.127.42.186.static.anycast.cnt-grms.ec) [186.42.127.54]:45614 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/186.42.127.54)
...
2019-07-23 19:34:57
222.121.135.68 attackspam
Jul 23 12:45:45 SilenceServices sshd[12840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.121.135.68
Jul 23 12:45:47 SilenceServices sshd[12840]: Failed password for invalid user reg from 222.121.135.68 port 39990 ssh2
Jul 23 12:51:10 SilenceServices sshd[16557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.121.135.68
2019-07-23 19:06:53
193.32.163.182 attackbotsspam
Jul 23 13:03:15 ArkNodeAT sshd\[4225\]: Invalid user admin from 193.32.163.182
Jul 23 13:03:15 ArkNodeAT sshd\[4225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.182
Jul 23 13:03:17 ArkNodeAT sshd\[4225\]: Failed password for invalid user admin from 193.32.163.182 port 41326 ssh2
2019-07-23 19:10:25
217.238.166.113 attack
Jul 23 01:07:07 cac1d2 sshd\[23591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.238.166.113  user=root
Jul 23 01:07:09 cac1d2 sshd\[23591\]: Failed password for root from 217.238.166.113 port 57842 ssh2
Jul 23 03:40:14 cac1d2 sshd\[11268\]: Invalid user ftpuser from 217.238.166.113 port 42533
Jul 23 03:40:14 cac1d2 sshd\[11268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.238.166.113
...
2019-07-23 19:11:34
185.234.216.99 attackspam
2019-07-23T14:21:59.777458ns1.unifynetsol.net postfix/smtpd\[29373\]: warning: unknown\[185.234.216.99\]: SASL LOGIN authentication failed: authentication failure
2019-07-23T14:28:55.767045ns1.unifynetsol.net postfix/smtpd\[29373\]: warning: unknown\[185.234.216.99\]: SASL LOGIN authentication failed: authentication failure
2019-07-23T14:35:56.031189ns1.unifynetsol.net postfix/smtpd\[6175\]: warning: unknown\[185.234.216.99\]: SASL LOGIN authentication failed: authentication failure
2019-07-23T14:42:52.297649ns1.unifynetsol.net postfix/smtpd\[6175\]: warning: unknown\[185.234.216.99\]: SASL LOGIN authentication failed: authentication failure
2019-07-23T14:49:48.622873ns1.unifynetsol.net postfix/smtpd\[8338\]: warning: unknown\[185.234.216.99\]: SASL LOGIN authentication failed: authentication failure
2019-07-23 19:47:15
153.36.242.143 attack
Jul 23 13:00:24 MainVPS sshd[32286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
Jul 23 13:00:26 MainVPS sshd[32286]: Failed password for root from 153.36.242.143 port 37524 ssh2
Jul 23 13:00:40 MainVPS sshd[32306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
Jul 23 13:00:43 MainVPS sshd[32306]: Failed password for root from 153.36.242.143 port 19710 ssh2
Jul 23 13:00:56 MainVPS sshd[32334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
Jul 23 13:00:58 MainVPS sshd[32334]: Failed password for root from 153.36.242.143 port 12096 ssh2
...
2019-07-23 19:15:59
91.217.109.106 attack
Automatic report - Port Scan Attack
2019-07-23 19:56:00
131.255.233.22 attackspam
Jul 23 07:34:57 vps200512 sshd\[29046\]: Invalid user user01 from 131.255.233.22
Jul 23 07:34:57 vps200512 sshd\[29046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.255.233.22
Jul 23 07:34:59 vps200512 sshd\[29046\]: Failed password for invalid user user01 from 131.255.233.22 port 35714 ssh2
Jul 23 07:41:08 vps200512 sshd\[29288\]: Invalid user ts3 from 131.255.233.22
Jul 23 07:41:08 vps200512 sshd\[29288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.255.233.22
2019-07-23 19:44:06
71.6.232.5 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-23 19:09:54
182.61.133.143 attack
Jul 23 13:34:57 dedicated sshd[19020]: Invalid user photo from 182.61.133.143 port 49342
2019-07-23 19:37:27
185.176.27.186 attack
Port scan
2019-07-23 19:24:46
182.253.119.90 attack
masters-of-media.de 182.253.119.90 \[23/Jul/2019:11:19:59 +0200\] "POST /wp-login.php HTTP/1.1" 200 5854 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
masters-of-media.de 182.253.119.90 \[23/Jul/2019:11:20:05 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4102 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-23 19:38:40
121.122.103.212 attackspam
2019-07-23T11:01:46.169622abusebot-7.cloudsearch.cf sshd\[15348\]: Invalid user pp from 121.122.103.212 port 52971
2019-07-23 19:26:29

Recently Reported IPs

197.113.168.73 89.104.80.125 53.209.73.139 22.51.154.162
247.96.218.181 179.151.59.66 8.175.138.106 253.213.80.133
97.207.14.231 49.179.70.217 12.60.151.43 7.6.56.253
93.144.127.90 182.191.132.124 132.85.152.255 174.29.161.185
193.158.118.76 235.88.89.98 182.1.140.11 38.78.246.94