Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: Hetzner Online GmbH

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
46.4.157.45 attackspambots
May 14 06:27:59 debian-2gb-nbg1-2 kernel: \[11689334.360491\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=46.4.157.45 DST=195.201.40.59 LEN=52 TOS=0x02 PREC=0x00 TTL=120 ID=12657 DF PROTO=TCP SPT=62345 DPT=3389 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0
2020-05-14 19:25:08
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.4.157.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30388
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;46.4.157.245.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081701 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 18 07:24:16 CST 2019
;; MSG SIZE  rcvd: 116

Host info
245.157.4.46.in-addr.arpa has no PTR record
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
245.157.4.46.in-addr.arpa	name = ns414.superweb.gr.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
151.252.108.128 attack
Unauthorized connection attempt from IP address 151.252.108.128 on Port 445(SMB)
2019-07-22 16:41:51
46.101.142.238 attackbots
Automatic report - Banned IP Access
2019-07-22 17:19:44
196.0.109.222 attackspambots
3389BruteforceFW21
2019-07-22 16:58:11
14.234.174.22 attackspambots
Unauthorized connection attempt from IP address 14.234.174.22 on Port 445(SMB)
2019-07-22 16:34:30
123.20.86.1 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 02:52:45,806 INFO [amun_request_handler] PortScan Detected on Port: 445 (123.20.86.1)
2019-07-22 17:23:09
78.186.19.87 attack
DATE:2019-07-22 05:05:10, IP:78.186.19.87, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-07-22 17:09:10
41.227.21.171 attack
Jul 22 12:02:04 yabzik sshd[1395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.227.21.171
Jul 22 12:02:07 yabzik sshd[1395]: Failed password for invalid user debian from 41.227.21.171 port 54329 ssh2
Jul 22 12:08:39 yabzik sshd[3764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.227.21.171
2019-07-22 17:22:48
36.84.86.40 attackspambots
Unauthorized connection attempt from IP address 36.84.86.40 on Port 445(SMB)
2019-07-22 16:49:32
101.224.122.67 attackspambots
Unauthorized connection attempt from IP address 101.224.122.67 on Port 445(SMB)
2019-07-22 17:07:45
182.53.198.244 attackbots
Unauthorized connection attempt from IP address 182.53.198.244 on Port 445(SMB)
2019-07-22 16:55:22
125.25.187.161 attackbotsspam
Unauthorized connection attempt from IP address 125.25.187.161 on Port 445(SMB)
2019-07-22 17:03:48
123.27.27.147 attackbotsspam
Unauthorized connection attempt from IP address 123.27.27.147 on Port 445(SMB)
2019-07-22 16:57:35
110.136.206.179 attackbots
Unauthorized connection attempt from IP address 110.136.206.179 on Port 445(SMB)
2019-07-22 16:31:47
145.239.67.136 attackbotsspam
[portscan] Port scan
2019-07-22 16:40:03
217.17.35.36 attackspam
RDP Bruteforce
2019-07-22 17:20:25

Recently Reported IPs

111.201.21.168 154.35.64.108 24.147.8.232 27.208.220.219
179.7.224.129 121.8.237.1 47.198.20.227 54.36.234.208
193.88.60.98 45.60.204.9 57.80.94.56 45.60.198.9
76.2.92.69 45.55.213.169 2.56.212.200 27.186.3.0
150.52.145.204 178.159.102.3 119.224.222.153 31.250.218.174