Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 63.45.138.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11352
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;63.45.138.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010602 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 12:06:28 CST 2025
;; MSG SIZE  rcvd: 105
Host info
42.138.45.63.in-addr.arpa domain name pointer host42.sub-63-45-138.myvzw.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.138.45.63.in-addr.arpa	name = host42.sub-63-45-138.myvzw.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.50.149.11 attackspambots
May  9 11:30:53 relay postfix/smtpd\[29787\]: warning: unknown\[185.50.149.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  9 11:31:19 relay postfix/smtpd\[29787\]: warning: unknown\[185.50.149.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  9 11:33:18 relay postfix/smtpd\[4246\]: warning: unknown\[185.50.149.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  9 11:33:38 relay postfix/smtpd\[9030\]: warning: unknown\[185.50.149.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  9 11:43:02 relay postfix/smtpd\[5244\]: warning: unknown\[185.50.149.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-10 03:03:24
45.13.93.82 attack
Unauthorized connection attempt detected from IP address 45.13.93.82 to port 8080
2020-05-10 02:59:09
77.247.108.119 attackspam
Unauthorized connection attempt detected from IP address 77.247.108.119 to port 443
2020-05-10 03:06:10
156.238.1.143 attackspambots
May  9 06:34:34 haigwepa sshd[10968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.238.1.143 
May  9 06:34:36 haigwepa sshd[10968]: Failed password for invalid user sabina from 156.238.1.143 port 35702 ssh2
...
2020-05-10 02:53:37
122.62.138.111 attack
Apr 18 01:11:53 server5 sshd[25132]: User admin from 122.62.138.111 not allowed because not listed in AllowUsers
Apr 18 01:11:53 server5 sshd[25132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.62.138.111  user=admin
Apr 18 01:11:55 server5 sshd[25132]: Failed password for invalid user admin from 122.62.138.111 port 59149 ssh2
Apr 18 01:11:56 server5 sshd[25132]: Connection closed by 122.62.138.111 port 59149 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=122.62.138.111
2020-05-10 03:03:58
156.96.56.81 attack
Brute forcing email accounts
2020-05-10 02:56:31
68.183.80.14 attack
68.183.80.14 - - \[09/May/2020:12:15:58 +0200\] "POST /wp-login.php HTTP/1.0" 200 5674 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
68.183.80.14 - - \[09/May/2020:12:16:00 +0200\] "POST /wp-login.php HTTP/1.0" 200 5474 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
68.183.80.14 - - \[09/May/2020:12:16:06 +0200\] "POST /wp-login.php HTTP/1.0" 200 5490 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-05-10 03:11:26
106.124.131.70 attackspam
May  9 08:33:55 minden010 sshd[29003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.131.70
May  9 08:33:58 minden010 sshd[29003]: Failed password for invalid user bb from 106.124.131.70 port 39365 ssh2
May  9 08:39:22 minden010 sshd[31949]: Failed password for root from 106.124.131.70 port 38896 ssh2
...
2020-05-10 02:58:47
45.14.150.14 attackspambots
[portscan] udp/3702 [ws-discovery]
*(RWIN=-)(05091104)
2020-05-10 02:49:52
177.12.227.131 attack
May  9 07:21:13 pornomens sshd\[4026\]: Invalid user deepesh from 177.12.227.131 port 17436
May  9 07:21:13 pornomens sshd\[4026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.12.227.131
May  9 07:21:15 pornomens sshd\[4026\]: Failed password for invalid user deepesh from 177.12.227.131 port 17436 ssh2
...
2020-05-10 02:37:56
31.211.191.11 attack
Automatic report - Port Scan Attack
2020-05-10 03:15:02
124.128.196.59 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-10 02:45:26
111.93.4.174 attackbots
May  9 06:35:25 PorscheCustomer sshd[20117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.4.174
May  9 06:35:27 PorscheCustomer sshd[20117]: Failed password for invalid user ito from 111.93.4.174 port 53684 ssh2
May  9 06:39:25 PorscheCustomer sshd[20273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.4.174
...
2020-05-10 02:30:50
187.138.83.225 attackspambots
Lines containing failures of 187.138.83.225
May  8 17:09:25 shared11 sshd[25232]: Invalid user pi from 187.138.83.225 port 59342
May  8 17:09:25 shared11 sshd[25233]: Invalid user pi from 187.138.83.225 port 59348
May  8 17:09:25 shared11 sshd[25232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.138.83.225
May  8 17:09:25 shared11 sshd[25233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.138.83.225


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=187.138.83.225
2020-05-10 03:01:01
94.177.246.39 attackspam
May  9 04:07:05 ns392434 sshd[11722]: Invalid user user3 from 94.177.246.39 port 51178
May  9 04:07:05 ns392434 sshd[11722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.246.39
May  9 04:07:05 ns392434 sshd[11722]: Invalid user user3 from 94.177.246.39 port 51178
May  9 04:07:07 ns392434 sshd[11722]: Failed password for invalid user user3 from 94.177.246.39 port 51178 ssh2
May  9 04:19:59 ns392434 sshd[11949]: Invalid user mc from 94.177.246.39 port 53940
May  9 04:19:59 ns392434 sshd[11949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.246.39
May  9 04:19:59 ns392434 sshd[11949]: Invalid user mc from 94.177.246.39 port 53940
May  9 04:20:02 ns392434 sshd[11949]: Failed password for invalid user mc from 94.177.246.39 port 53940 ssh2
May  9 04:25:15 ns392434 sshd[12178]: Invalid user water from 94.177.246.39 port 34648
2020-05-10 02:31:51

Recently Reported IPs

48.127.107.222 232.191.165.130 78.122.7.150 21.141.169.117
186.181.41.227 108.91.210.73 197.58.230.124 127.93.37.88
119.119.9.88 169.33.0.4 134.79.159.34 9.169.191.85
50.82.173.252 7.65.3.193 52.110.59.152 79.37.135.49
87.46.12.236 140.223.95.72 173.26.152.95 108.224.228.254