Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: Noord Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.9.148.29 attackbots
Fail2Ban Ban Triggered
2020-09-09 20:28:52
45.9.148.29 attack
Fail2Ban Ban Triggered
2020-09-09 14:26:03
45.9.148.29 attackbots
Fail2Ban Ban Triggered
2020-09-09 06:37:37
45.9.148.82 attackspam
Probable attack : HTTPS hit by IP; not hostname
2020-08-05 05:13:44
45.9.148.125 attack
2020-07-23 15:43:19
45.9.148.194 attack
/adminer/adminer.php
2020-07-08 02:48:46
45.9.148.91 attack
sca
2020-07-05 19:44:20
45.9.148.194 attackbotsspam
404 NOT FOUND
2020-07-04 16:33:20
45.9.148.91 attackspambots
Unauthorized connection attempt detected from IP address 45.9.148.91 to port 53
2020-06-24 12:48:06
45.9.148.213 attackbots
schuetzenmusikanten.de 45.9.148.213 [20/Jun/2020:14:18:46 +0200] "POST /xmlrpc.php HTTP/1.0" 301 511 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
schuetzenmusikanten.de 45.9.148.213 [20/Jun/2020:14:18:48 +0200] "POST /xmlrpc.php HTTP/1.0" 200 3595 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
2020-06-20 22:24:58
45.9.148.91 attackspambots
IP: 45.9.148.91
Ports affected
    HTTP protocol over TLS/SSL (443) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS49447 Nice IT Services Group Inc.
   Netherlands (NL)
   CIDR 45.9.148.0/23
Log Date: 10/06/2020 8:12:49 AM UTC
2020-06-10 16:38:20
45.9.148.215 attackspambots
xmlrpc attack
2020-06-05 21:27:32
45.9.148.220 attackbotsspam
(mod_security) mod_security (id:210492) triggered by 45.9.148.220 (NL/Netherlands/-): 5 in the last 3600 secs
2020-05-31 07:52:05
45.9.148.131 attack
SSH login attempts.
2020-05-28 14:52:20
45.9.148.213 attackbots
Tor exit node
2020-05-28 02:35:30
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.9.148.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3038
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.9.148.142.			IN	A

;; AUTHORITY SECTION:
.			286	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023011000 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 11 00:11:15 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 142.148.9.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.148.9.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.83.66.197 attackspambots
2019-12-11T15:58:43.337Z CLOSE host=45.83.66.197 port=12790 fd=4 time=20.020 bytes=25
...
2020-03-13 03:57:25
47.106.136.178 attackbotsspam
2020-01-28T13:45:44.765Z CLOSE host=47.106.136.178 port=49160 fd=4 time=20.011 bytes=15
...
2020-03-13 03:44:18
82.212.125.102 attackbots
Repeated attempts against wp-login
2020-03-13 04:05:53
23.151.131.98 attack
Scan detected 2020.03.12 13:28:43 blocked until 2020.04.06 11:00:06
2020-03-13 03:36:14
49.49.235.168 attackspam
2019-12-08T20:32:11.312Z CLOSE host=49.49.235.168 port=2369 fd=4 time=20.013 bytes=14
...
2020-03-13 03:26:45
47.9.222.250 attack
2019-11-29T11:20:21.418Z CLOSE host=47.9.222.250 port=50902 fd=4 time=160.114 bytes=260
...
2020-03-13 03:41:34
46.35.89.153 attackbotsspam
2020-01-27T01:36:56.590Z CLOSE host=46.35.89.153 port=56311 fd=4 time=20.012 bytes=31
...
2020-03-13 03:47:26
220.143.26.161 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-13 04:05:32
66.240.205.34 attackspam
Zero Access Trojan Communication Attempt
2020-03-13 04:01:29
122.51.47.246 attackspam
Tried sshing with brute force.
2020-03-13 04:07:12
46.249.32.135 attackspambots
2020-03-07T13:24:33.606Z CLOSE host=46.249.32.135 port=37462 fd=4 time=20.015 bytes=32
...
2020-03-13 03:46:51
117.52.87.230 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-03-13 03:53:48
222.186.173.154 attackbotsspam
Mar 13 00:56:40 areeb-Workstation sshd[20151]: Failed password for root from 222.186.173.154 port 45536 ssh2
Mar 13 00:56:45 areeb-Workstation sshd[20151]: Failed password for root from 222.186.173.154 port 45536 ssh2
...
2020-03-13 03:27:51
45.238.121.153 attack
2020-02-19T21:35:47.249Z CLOSE host=45.238.121.153 port=44405 fd=4 time=60.031 bytes=111
...
2020-03-13 04:04:12
45.227.255.224 attackspam
2020-02-18T00:11:19.106Z CLOSE host=45.227.255.224 port=61000 fd=5 time=40.023 bytes=51
...
2020-03-13 04:05:11

Recently Reported IPs

108.115.160.226 83.117.171.192 6.146.164.70 242.214.2.210
212.67.154.208 231.154.195.203 19.128.138.6 183.80.41.164
167.223.239.242 159.4.104.65 144.119.97.100 156.181.201.156
43.255.111.85 229.89.218.61 187.78.181.253 92.118.25.218
164.154.216.228 83.76.50.176 91.250.240.42 51.11.117.248