Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.81.39.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35931
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.81.39.0.			IN	A

;; AUTHORITY SECTION:
.			290	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052301 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 07:45:00 CST 2023
;; MSG SIZE  rcvd: 103
Host info
Host 0.39.81.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.39.81.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
140.207.46.136 attack
Scanning random ports - tries to find possible vulnerable services
2019-08-21 07:44:33
129.211.24.100 attackspambots
Aug 21 02:25:13 server sshd\[24841\]: Invalid user alfons from 129.211.24.100 port 35606
Aug 21 02:25:13 server sshd\[24841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.24.100
Aug 21 02:25:15 server sshd\[24841\]: Failed password for invalid user alfons from 129.211.24.100 port 35606 ssh2
Aug 21 02:30:07 server sshd\[13639\]: User root from 129.211.24.100 not allowed because listed in DenyUsers
Aug 21 02:30:07 server sshd\[13639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.24.100  user=root
2019-08-21 07:45:11
173.249.58.234 attackbots
RDP Bruteforce
2019-08-21 08:11:36
182.61.166.179 attack
Aug 20 04:40:10 hcbb sshd\[12082\]: Invalid user chuan from 182.61.166.179
Aug 20 04:40:10 hcbb sshd\[12082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.166.179
Aug 20 04:40:12 hcbb sshd\[12082\]: Failed password for invalid user chuan from 182.61.166.179 port 54370 ssh2
Aug 20 04:45:01 hcbb sshd\[12518\]: Invalid user elsa from 182.61.166.179
Aug 20 04:45:01 hcbb sshd\[12518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.166.179
2019-08-21 07:46:19
213.136.78.224 attack
2019-08-20T23:09:48.680798abusebot.cloudsearch.cf sshd\[18260\]: Invalid user lablab from 213.136.78.224 port 51486
2019-08-20T23:09:48.685048abusebot.cloudsearch.cf sshd\[18260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.136.78.224
2019-08-21 07:36:07
216.155.93.77 attackspam
Aug 21 02:03:19 eventyay sshd[4021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.155.93.77
Aug 21 02:03:21 eventyay sshd[4021]: Failed password for invalid user thursday from 216.155.93.77 port 54048 ssh2
Aug 21 02:08:16 eventyay sshd[5347]: Failed password for root from 216.155.93.77 port 59836 ssh2
...
2019-08-21 08:10:02
59.100.246.170 attack
Invalid user guest from 59.100.246.170 port 49879
2019-08-21 08:03:32
45.55.20.128 attackspam
Aug 20 06:13:41 web1 sshd\[19425\]: Invalid user ezequiel123 from 45.55.20.128
Aug 20 06:13:41 web1 sshd\[19425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.20.128
Aug 20 06:13:43 web1 sshd\[19425\]: Failed password for invalid user ezequiel123 from 45.55.20.128 port 51470 ssh2
Aug 20 06:18:26 web1 sshd\[19914\]: Invalid user 123456 from 45.55.20.128
Aug 20 06:18:26 web1 sshd\[19914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.20.128
2019-08-21 07:51:11
51.79.66.229 attackspambots
Aug 21 01:30:33 [munged] sshd[15275]: Invalid user divya from 51.79.66.229 port 43400
Aug 21 01:30:33 [munged] sshd[15275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.66.229
2019-08-21 07:33:33
92.222.36.216 attackspambots
Aug 20 18:11:09 tuxlinux sshd[32431]: Invalid user pj from 92.222.36.216 port 38054
Aug 20 18:11:09 tuxlinux sshd[32431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.36.216 
Aug 20 18:11:09 tuxlinux sshd[32431]: Invalid user pj from 92.222.36.216 port 38054
Aug 20 18:11:09 tuxlinux sshd[32431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.36.216 
Aug 20 18:11:09 tuxlinux sshd[32431]: Invalid user pj from 92.222.36.216 port 38054
Aug 20 18:11:09 tuxlinux sshd[32431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.36.216 
Aug 20 18:11:11 tuxlinux sshd[32431]: Failed password for invalid user pj from 92.222.36.216 port 38054 ssh2
...
2019-08-21 07:50:40
35.0.127.52 attackspam
Automated report - ssh fail2ban:
Aug 21 00:25:39 wrong password, user=root, port=50300, ssh2
Aug 21 00:25:43 wrong password, user=root, port=50300, ssh2
Aug 21 00:25:47 wrong password, user=root, port=50300, ssh2
Aug 21 00:25:51 wrong password, user=root, port=50300, ssh2
2019-08-21 07:33:55
112.65.201.26 attackspam
Aug 21 02:59:47 server sshd\[26455\]: Invalid user lfs from 112.65.201.26 port 19772
Aug 21 02:59:47 server sshd\[26455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.65.201.26
Aug 21 02:59:49 server sshd\[26455\]: Failed password for invalid user lfs from 112.65.201.26 port 19772 ssh2
Aug 21 03:03:27 server sshd\[31421\]: Invalid user deploy from 112.65.201.26 port 36321
Aug 21 03:03:27 server sshd\[31421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.65.201.26
2019-08-21 08:04:42
68.183.94.194 attackbots
Aug 20 16:44:26 lnxmail61 sshd[21740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.94.194
2019-08-21 08:12:32
68.183.110.49 attack
Aug 20 05:31:56 eddieflores sshd\[28311\]: Invalid user wj from 68.183.110.49
Aug 20 05:31:56 eddieflores sshd\[28311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.110.49
Aug 20 05:31:58 eddieflores sshd\[28311\]: Failed password for invalid user wj from 68.183.110.49 port 45300 ssh2
Aug 20 05:36:22 eddieflores sshd\[28710\]: Invalid user sidney from 68.183.110.49
Aug 20 05:36:22 eddieflores sshd\[28710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.110.49
2019-08-21 07:55:52
114.95.169.68 attackspam
SMB Server BruteForce Attack
2019-08-21 07:46:55

Recently Reported IPs

45.81.39.4 45.140.167.0 45.140.167.79 31.184.241.0
31.184.241.98 185.231.247.0 138.124.182.0 119.185.170.66
112.114.106.22 83.243.255.180 178.122.71.53 124.16.102.25
161.35.172.37 251.143.242.209 185.23.253.150 222.65.242.4
69.90.62.242 134.85.18.246 147.6.21.175 102.66.239.113