Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.34.242.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25009
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.34.242.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 20:52:59 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 45.242.34.64.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 45.242.34.64.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
122.175.55.196 attack
Invalid user cooper from 122.175.55.196 port 13200
2019-08-27 16:05:40
51.140.241.96 attackspam
Automated report - ssh fail2ban:
Aug 27 10:01:58 authentication failure 
Aug 27 10:02:00 wrong password, user=bridge, port=55954, ssh2
Aug 27 10:06:55 authentication failure
2019-08-27 16:19:01
13.79.236.181 attackbotsspam
Aug 27 09:26:14 tux-35-217 sshd\[6280\]: Invalid user ehsan from 13.79.236.181 port 1984
Aug 27 09:26:14 tux-35-217 sshd\[6280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.79.236.181
Aug 27 09:26:16 tux-35-217 sshd\[6280\]: Failed password for invalid user ehsan from 13.79.236.181 port 1984 ssh2
Aug 27 09:30:35 tux-35-217 sshd\[6335\]: Invalid user samba from 13.79.236.181 port 1984
Aug 27 09:30:35 tux-35-217 sshd\[6335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.79.236.181
...
2019-08-27 16:38:07
165.22.76.39 attackspambots
Aug 27 02:33:43 legacy sshd[2378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.76.39
Aug 27 02:33:44 legacy sshd[2378]: Failed password for invalid user dev from 165.22.76.39 port 54104 ssh2
Aug 27 02:37:53 legacy sshd[2515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.76.39
...
2019-08-27 16:14:35
54.39.148.234 attackbotsspam
Aug 16 07:24:16 vtv3 sshd\[2017\]: Invalid user support from 54.39.148.234 port 35738
Aug 16 07:24:16 vtv3 sshd\[2017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.148.234
Aug 16 07:24:18 vtv3 sshd\[2017\]: Failed password for invalid user support from 54.39.148.234 port 35738 ssh2
Aug 16 07:24:27 vtv3 sshd\[2084\]: Invalid user tech from 54.39.148.234 port 37492
Aug 16 07:24:27 vtv3 sshd\[2084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.148.234
Aug 17 04:58:28 vtv3 sshd\[19720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.148.234  user=root
Aug 17 04:58:30 vtv3 sshd\[19720\]: Failed password for root from 54.39.148.234 port 42766 ssh2
Aug 17 04:58:34 vtv3 sshd\[19720\]: Failed password for root from 54.39.148.234 port 42766 ssh2
Aug 17 04:58:36 vtv3 sshd\[19720\]: Failed password for root from 54.39.148.234 port 42766 ssh2
Aug 17 04:58:40 vtv3 ssh
2019-08-27 16:06:34
187.26.140.27 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-08-27 16:41:32
117.218.63.25 attackbots
Aug 26 19:30:16 web9 sshd\[21026\]: Invalid user jen from 117.218.63.25
Aug 26 19:30:16 web9 sshd\[21026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.218.63.25
Aug 26 19:30:18 web9 sshd\[21026\]: Failed password for invalid user jen from 117.218.63.25 port 55896 ssh2
Aug 26 19:39:42 web9 sshd\[23017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.218.63.25  user=root
Aug 26 19:39:44 web9 sshd\[23017\]: Failed password for root from 117.218.63.25 port 50696 ssh2
2019-08-27 16:31:42
14.170.154.147 attack
Unauthorized connection attempt from IP address 14.170.154.147 on Port 445(SMB)
2019-08-27 16:29:00
37.59.242.122 attackbots
Aug 27 05:48:01 localhost sshd\[31429\]: Invalid user temp from 37.59.242.122 port 46280
Aug 27 05:48:01 localhost sshd\[31429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.242.122
Aug 27 05:48:03 localhost sshd\[31429\]: Failed password for invalid user temp from 37.59.242.122 port 46280 ssh2
...
2019-08-27 16:07:59
183.88.244.101 attackspambots
Aug 26 16:04:46 friendsofhawaii sshd\[8316\]: Invalid user smhyun from 183.88.244.101
Aug 26 16:04:46 friendsofhawaii sshd\[8316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.88.244.101
Aug 26 16:04:48 friendsofhawaii sshd\[8316\]: Failed password for invalid user smhyun from 183.88.244.101 port 34286 ssh2
Aug 26 16:10:07 friendsofhawaii sshd\[8962\]: Invalid user alberto from 183.88.244.101
Aug 26 16:10:07 friendsofhawaii sshd\[8962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.88.244.101
2019-08-27 16:46:37
60.191.38.77 attack
Multiport scan : 24 ports scanned 10 20 40 50 60 70 80 81 90 443 1010 2020 3030 4040 5050 6060 7070 8080 8181 8443 9090 12345 18080 54321
2019-08-27 16:13:29
201.151.139.242 attackbots
Unauthorized connection attempt from IP address 201.151.139.242 on Port 445(SMB)
2019-08-27 16:18:02
121.7.127.92 attack
Aug 27 05:30:22 rpi sshd[14444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.7.127.92 
Aug 27 05:30:24 rpi sshd[14444]: Failed password for invalid user waleed from 121.7.127.92 port 34691 ssh2
2019-08-27 16:31:11
157.55.39.132 attackspambots
FakeBingbot
2019-08-27 16:50:40
211.174.123.131 attackbotsspam
Aug 27 07:28:54 SilenceServices sshd[28276]: Failed password for root from 211.174.123.131 port 23788 ssh2
Aug 27 07:33:51 SilenceServices sshd[30112]: Failed password for root from 211.174.123.131 port 5365 ssh2
2019-08-27 16:25:29

Recently Reported IPs

26.192.204.3 194.118.1.107 67.7.131.223 80.253.136.19
24.144.227.184 79.75.156.206 41.97.163.191 150.150.183.227
138.96.90.49 231.246.18.129 227.10.214.121 109.128.87.82
214.166.17.36 198.55.211.130 149.210.22.122 215.104.78.7
180.75.65.92 59.21.63.47 222.165.175.78 207.154.185.28