Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.45.139.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3543
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.45.139.205.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 15:22:48 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 205.139.45.64.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 64.45.139.205.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
1.202.240.163 attackbotsspam
Port 1433 Scan
2020-01-02 06:42:39
159.203.161.8 attackspam
DigitalOcean BotNet attack - 10s of requests to non-existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
node-superagent/4.1.0
2020-01-02 06:53:55
42.115.14.123 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2020-01-02 06:40:51
115.77.186.182 attack
Honeypot attack, port: 81, PTR: adsl.viettel.vn.
2020-01-02 06:54:11
179.189.246.102 attackspam
Port 1433 Scan
2020-01-02 06:35:58
171.220.179.48 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-02 06:51:46
178.128.24.84 attackspam
Jan  1 20:38:35 server sshd\[23390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.24.84  user=root
Jan  1 20:38:37 server sshd\[23390\]: Failed password for root from 178.128.24.84 port 36148 ssh2
Jan  1 20:53:20 server sshd\[25931\]: Invalid user briseno from 178.128.24.84
Jan  1 20:53:20 server sshd\[25931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.24.84 
Jan  1 20:53:22 server sshd\[25931\]: Failed password for invalid user briseno from 178.128.24.84 port 36936 ssh2
...
2020-01-02 06:43:53
161.81.153.130 attackspam
Fail2Ban Ban Triggered
2020-01-02 06:47:20
176.36.255.12 attackspambots
Honeypot attack, port: 81, PTR: host-176-36-255-12.la.net.ua.
2020-01-02 06:51:31
41.38.82.213 attack
Honeypot attack, port: 445, PTR: host-41.38.82.213.tedata.net.
2020-01-02 06:50:06
79.143.44.122 attackspambots
$f2bV_matches
2020-01-02 06:41:27
193.31.24.113 attackspambots
01/01/2020-23:54:38.950590 193.31.24.113 Protocol: 6 ET CHAT IRC PONG response
2020-01-02 07:00:11
45.33.106.194 attackspam
firewall-block, port(s): 47808/tcp
2020-01-02 06:56:30
154.66.196.32 attackbotsspam
Brute-force attempt banned
2020-01-02 07:01:41
54.36.232.55 attackbots
Jan  1 14:32:05 vps46666688 sshd[11360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.232.55
Jan  1 14:32:06 vps46666688 sshd[11360]: Failed password for invalid user salditt from 54.36.232.55 port 33054 ssh2
...
2020-01-02 06:39:26

Recently Reported IPs

117.14.124.241 220.32.163.123 33.147.47.69 229.12.222.58
134.238.74.50 223.215.255.243 9.183.38.72 99.165.254.100
54.111.221.181 202.233.1.220 33.165.33.221 248.115.118.132
207.216.227.98 218.74.165.234 44.2.23.90 136.203.104.81
130.151.110.101 32.171.124.34 180.151.154.87 202.230.60.233