Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.45.154.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26833
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.45.154.71.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 14:26:29 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 71.154.45.64.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 64.45.154.71.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
151.80.41.64 attack
Invalid user user5 from 151.80.41.64 port 39489
2020-07-24 01:10:01
120.131.3.119 attack
sshd jail - ssh hack attempt
2020-07-24 01:14:30
182.71.246.162 attackbots
Invalid user michael from 182.71.246.162 port 46482
2020-07-24 01:23:56
196.220.66.131 attackbotsspam
Invalid user jaime from 196.220.66.131 port 60556
2020-07-24 01:06:12
164.77.114.165 attack
2020-07-23T18:44:44.684058vps751288.ovh.net sshd\[2269\]: Invalid user toth from 164.77.114.165 port 58318
2020-07-23T18:44:44.693352vps751288.ovh.net sshd\[2269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.114.165
2020-07-23T18:44:46.847240vps751288.ovh.net sshd\[2269\]: Failed password for invalid user toth from 164.77.114.165 port 58318 ssh2
2020-07-23T18:49:30.691724vps751288.ovh.net sshd\[2347\]: Invalid user zhan from 164.77.114.165 port 43664
2020-07-23T18:49:30.701037vps751288.ovh.net sshd\[2347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.114.165
2020-07-24 01:24:46
89.248.168.157 attack
firewall-block, port(s): 6401/tcp
2020-07-24 01:30:48
114.67.77.148 attackbotsspam
Invalid user dino from 114.67.77.148 port 45804
2020-07-24 01:01:13
64.183.249.110 attack
2020-07-23T16:32:17.799391vps1033 sshd[19115]: Invalid user postgres from 64.183.249.110 port 29010
2020-07-23T16:32:17.804455vps1033 sshd[19115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=rrcs-64-183-249-110.sw.biz.rr.com
2020-07-23T16:32:17.799391vps1033 sshd[19115]: Invalid user postgres from 64.183.249.110 port 29010
2020-07-23T16:32:20.075238vps1033 sshd[19115]: Failed password for invalid user postgres from 64.183.249.110 port 29010 ssh2
2020-07-23T16:36:31.400829vps1033 sshd[27939]: Invalid user user01 from 64.183.249.110 port 63966
...
2020-07-24 01:02:55
185.153.196.226 attackspam
nginx-botsearch jail
2020-07-24 00:59:50
106.124.136.103 attackbots
2020-07-23T15:24:22.614627snf-827550 sshd[31257]: Invalid user prueba from 106.124.136.103 port 60386
2020-07-23T15:24:24.820712snf-827550 sshd[31257]: Failed password for invalid user prueba from 106.124.136.103 port 60386 ssh2
2020-07-23T15:26:25.997442snf-827550 sshd[31846]: Invalid user lz from 106.124.136.103 port 39589
...
2020-07-24 01:29:00
68.14.160.91 attackspam
Invalid user admin from 68.14.160.91 port 49753
2020-07-24 01:31:34
186.4.148.195 attack
Invalid user ubuntu from 186.4.148.195 port 30118
2020-07-24 01:06:58
35.188.166.245 attack
Jul 23 18:43:36 marvibiene sshd[24694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.188.166.245 
Jul 23 18:43:38 marvibiene sshd[24694]: Failed password for invalid user hadoop from 35.188.166.245 port 57592 ssh2
Jul 23 18:46:35 marvibiene sshd[24808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.188.166.245
2020-07-24 01:20:18
125.74.28.28 attack
Jul 23 15:27:34 vps639187 sshd\[1641\]: Invalid user btm from 125.74.28.28 port 56562
Jul 23 15:27:34 vps639187 sshd\[1641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.28.28
Jul 23 15:27:36 vps639187 sshd\[1641\]: Failed password for invalid user btm from 125.74.28.28 port 56562 ssh2
...
2020-07-24 01:12:43
217.91.144.95 attack
$f2bV_matches
2020-07-24 01:33:52

Recently Reported IPs

129.144.128.109 6.114.178.40 195.120.195.224 170.57.188.142
65.161.0.31 252.102.88.202 205.28.177.2 163.90.61.157
89.236.245.62 153.233.254.92 210.58.232.212 81.242.8.101
160.205.47.204 136.29.24.56 160.222.89.144 132.200.143.140
28.27.139.26 213.40.50.91 66.143.170.197 121.39.120.98