Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Columbus

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.180.94.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13706
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;48.180.94.45.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082501 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 26 02:11:38 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 45.94.180.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 45.94.180.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
109.201.27.107 attackspambots
Unauthorised access (Dec 14) SRC=109.201.27.107 LEN=52 TOS=0x10 PREC=0x40 TTL=112 ID=24422 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Dec 14) SRC=109.201.27.107 LEN=52 TOS=0x10 PREC=0x40 TTL=112 ID=31039 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-14 20:47:38
78.139.216.117 attackspam
Lines containing failures of 78.139.216.117
Dec 11 13:12:34 shared07 sshd[28927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.139.216.117  user=mysql
Dec 11 13:12:36 shared07 sshd[28927]: Failed password for mysql from 78.139.216.117 port 60170 ssh2
Dec 11 13:12:36 shared07 sshd[28927]: Received disconnect from 78.139.216.117 port 60170:11: Bye Bye [preauth]
Dec 11 13:12:36 shared07 sshd[28927]: Disconnected from authenticating user mysql 78.139.216.117 port 60170 [preauth]
Dec 11 13:24:10 shared07 sshd[617]: Invalid user guest from 78.139.216.117 port 45942
Dec 11 13:24:10 shared07 sshd[617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.139.216.117
Dec 11 13:24:12 shared07 sshd[617]: Failed password for invalid user guest from 78.139.216.117 port 45942 ssh2
Dec 11 13:24:12 shared07 sshd[617]: Received disconnect from 78.139.216.117 port 45942:11: Bye Bye [preauth]
Dec 11 13:24:1........
------------------------------
2019-12-14 20:33:43
103.127.77.78 attack
Dec 13 20:54:23 server6 sshd[8575]: Failed password for invalid user kerchenfaut from 103.127.77.78 port 40036 ssh2
Dec 13 20:54:23 server6 sshd[8575]: Received disconnect from 103.127.77.78: 11: Bye Bye [preauth]
Dec 13 21:02:09 server6 sshd[18080]: Failed password for invalid user statsvhostnameenskap from 103.127.77.78 port 58512 ssh2
Dec 13 21:02:09 server6 sshd[18080]: Received disconnect from 103.127.77.78: 11: Bye Bye [preauth]
Dec 13 21:09:07 server6 sshd[24813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.127.77.78  user=r.r
Dec 13 21:09:08 server6 sshd[24813]: Failed password for r.r from 103.127.77.78 port 42516 ssh2
Dec 13 21:09:08 server6 sshd[24813]: Received disconnect from 103.127.77.78: 11: Bye Bye [preauth]
Dec 13 21:15:54 server6 sshd[31041]: Failed password for invalid user amir from 103.127.77.78 port 54776 ssh2
Dec 13 21:15:55 server6 sshd[31041]: Received disconnect from 103.127.77.78: 11: Bye Bye [p........
-------------------------------
2019-12-14 20:29:04
61.177.172.128 attackbotsspam
Dec 14 06:46:58 server sshd\[3918\]: Failed password for root from 61.177.172.128 port 27102 ssh2
Dec 14 06:46:59 server sshd\[3931\]: Failed password for root from 61.177.172.128 port 54446 ssh2
Dec 14 15:31:07 server sshd\[30093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128  user=root
Dec 14 15:31:08 server sshd\[30093\]: Failed password for root from 61.177.172.128 port 9031 ssh2
Dec 14 15:31:12 server sshd\[30093\]: Failed password for root from 61.177.172.128 port 9031 ssh2
...
2019-12-14 20:44:14
129.211.147.123 attackspam
Invalid user hung from 129.211.147.123 port 53376
2019-12-14 20:25:13
192.169.215.114 attackspam
Cluster member 192.168.0.31 (-) said, DENY 192.169.215.114, Reason:[(imapd) Failed IMAP login from 192.169.215.114 (US/United States/ip-192-169-215-114.ip.secureserver.net): 1 in the last 3600 secs]
2019-12-14 20:36:30
42.115.221.40 attackbots
Invalid user drescher from 42.115.221.40 port 48498
2019-12-14 20:27:04
128.199.47.148 attackbotsspam
Dec 13 23:14:41 web1 sshd\[1000\]: Invalid user rrrrr from 128.199.47.148
Dec 13 23:14:41 web1 sshd\[1000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.47.148
Dec 13 23:14:42 web1 sshd\[1000\]: Failed password for invalid user rrrrr from 128.199.47.148 port 42534 ssh2
Dec 13 23:20:03 web1 sshd\[1625\]: Invalid user morik from 128.199.47.148
Dec 13 23:20:03 web1 sshd\[1625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.47.148
2019-12-14 20:28:35
139.59.84.111 attack
Dec 14 11:42:30 server sshd\[26883\]: Invalid user kurzendoerfer from 139.59.84.111
Dec 14 11:42:30 server sshd\[26883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.111 
Dec 14 11:42:33 server sshd\[26883\]: Failed password for invalid user kurzendoerfer from 139.59.84.111 port 42164 ssh2
Dec 14 11:48:36 server sshd\[28664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.111  user=root
Dec 14 11:48:38 server sshd\[28664\]: Failed password for root from 139.59.84.111 port 52534 ssh2
...
2019-12-14 20:37:10
179.232.1.254 attack
Dec 14 14:01:33 sso sshd[14579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.254
Dec 14 14:01:35 sso sshd[14579]: Failed password for invalid user test from 179.232.1.254 port 34199 ssh2
...
2019-12-14 21:02:07
178.128.42.36 attack
firewall-block, port(s): 3401/tcp
2019-12-14 20:58:52
170.84.183.34 attack
Dec 14 07:23:14 grey postfix/smtpd\[6298\]: NOQUEUE: reject: RCPT from 170.84.183.34.rrwifi.net.br\[170.84.183.34\]: 554 5.7.1 Service unavailable\; Client host \[170.84.183.34\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?170.84.183.34\; from=\ to=\ proto=ESMTP helo=\<170.84.183.34.rrwifi.net.br\>
...
2019-12-14 21:02:35
222.82.250.4 attack
Brute-force attempt banned
2019-12-14 20:51:33
185.176.27.2 attackspambots
12/14/2019-13:28:52.045067 185.176.27.2 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-14 20:43:33
211.253.10.96 attackbots
Dec 14 11:23:28 gw1 sshd[12408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.10.96
Dec 14 11:23:30 gw1 sshd[12408]: Failed password for invalid user hassell from 211.253.10.96 port 43688 ssh2
...
2019-12-14 20:45:58

Recently Reported IPs

17.189.116.48 134.114.23.58 31.7.225.17 198.73.50.231
106.12.183.6 168.121.56.67 103.149.195.83 105.166.233.67
98.230.151.249 113.163.0.66 11.56.223.30 89.146.187.82
112.73.80.20 152.73.155.243 131.191.82.119 103.73.102.30
129.68.73.14 164.15.72.129 195.158.31.150 146.96.188.138