Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: Noord Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.9.148.29 attackbots
Fail2Ban Ban Triggered
2020-09-09 20:28:52
45.9.148.29 attack
Fail2Ban Ban Triggered
2020-09-09 14:26:03
45.9.148.29 attackbots
Fail2Ban Ban Triggered
2020-09-09 06:37:37
45.9.148.82 attackspam
Probable attack : HTTPS hit by IP; not hostname
2020-08-05 05:13:44
45.9.148.125 attack
2020-07-23 15:43:19
45.9.148.194 attack
/adminer/adminer.php
2020-07-08 02:48:46
45.9.148.91 attack
sca
2020-07-05 19:44:20
45.9.148.194 attackbotsspam
404 NOT FOUND
2020-07-04 16:33:20
45.9.148.91 attackspambots
Unauthorized connection attempt detected from IP address 45.9.148.91 to port 53
2020-06-24 12:48:06
45.9.148.213 attackbots
schuetzenmusikanten.de 45.9.148.213 [20/Jun/2020:14:18:46 +0200] "POST /xmlrpc.php HTTP/1.0" 301 511 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
schuetzenmusikanten.de 45.9.148.213 [20/Jun/2020:14:18:48 +0200] "POST /xmlrpc.php HTTP/1.0" 200 3595 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
2020-06-20 22:24:58
45.9.148.91 attackspambots
IP: 45.9.148.91
Ports affected
    HTTP protocol over TLS/SSL (443) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS49447 Nice IT Services Group Inc.
   Netherlands (NL)
   CIDR 45.9.148.0/23
Log Date: 10/06/2020 8:12:49 AM UTC
2020-06-10 16:38:20
45.9.148.215 attackspambots
xmlrpc attack
2020-06-05 21:27:32
45.9.148.220 attackbotsspam
(mod_security) mod_security (id:210492) triggered by 45.9.148.220 (NL/Netherlands/-): 5 in the last 3600 secs
2020-05-31 07:52:05
45.9.148.131 attack
SSH login attempts.
2020-05-28 14:52:20
45.9.148.213 attackbots
Tor exit node
2020-05-28 02:35:30
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.9.148.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43357
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.9.148.234.			IN	A

;; AUTHORITY SECTION:
.			341	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112000 1800 900 604800 86400

;; Query time: 119 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 20 22:27:25 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 234.148.9.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.148.9.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.116.203.31 attackbots
unauthorized connection attempt
2020-02-19 18:51:09
1.170.94.105 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-19 18:59:06
222.121.148.219 attackbots
unauthorized connection attempt
2020-02-19 18:33:37
125.129.147.100 attack
unauthorized connection attempt
2020-02-19 18:30:09
212.75.193.66 attack
unauthorized connection attempt
2020-02-19 18:28:30
177.192.164.91 attack
unauthorized connection attempt
2020-02-19 19:11:01
178.33.145.241 attackbotsspam
Feb 19 11:11:32 SilenceServices sshd[22173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.145.241
Feb 19 11:11:35 SilenceServices sshd[22173]: Failed password for invalid user kate from 178.33.145.241 port 47350 ssh2
Feb 19 11:13:45 SilenceServices sshd[23033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.145.241
2020-02-19 19:10:44
121.172.165.102 attackspam
unauthorized connection attempt
2020-02-19 18:30:29
2.229.90.114 attackspam
unauthorized connection attempt
2020-02-19 18:58:41
114.24.197.129 attack
unauthorized connection attempt
2020-02-19 18:54:49
171.225.117.49 attack
unauthorized connection attempt
2020-02-19 18:49:30
121.151.103.14 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-19 18:41:24
5.137.17.102 attackbots
unauthorized connection attempt
2020-02-19 19:06:07
39.40.68.138 attackbots
unauthorized connection attempt
2020-02-19 18:57:46
94.0.223.79 attackspam
unauthorized connection attempt
2020-02-19 18:31:54

Recently Reported IPs

45.9.148.236 182.235.116.29 88.83.119.42 222.75.133.7
85.131.26.79 125.126.181.230 0.250.180.17 99.100.20.175
17.239.111.2 204.14.57.4 138.153.153.61 197.220.77.161
4.39.224.5 64.106.182.69 23.251.2.218 126.102.19.16
65.82.74.138 111.90.150.176 35.84.216.230 199.26.1.166