Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 9.45.144.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29154
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;9.45.144.56.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 15:24:23 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 56.144.45.9.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.144.45.9.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
23.25.133.82 attackbotsspam
RDP Bruteforce
2019-11-24 09:43:04
122.176.38.177 attackbotsspam
Nov 24 01:32:52 root sshd[28317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.38.177 
Nov 24 01:32:54 root sshd[28317]: Failed password for invalid user test1 from 122.176.38.177 port 38548 ssh2
Nov 24 01:40:50 root sshd[28428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.38.177 
...
2019-11-24 09:37:47
182.72.207.148 attackspambots
Nov 24 02:11:17 OPSO sshd\[32061\]: Invalid user www from 182.72.207.148 port 44647
Nov 24 02:11:17 OPSO sshd\[32061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.207.148
Nov 24 02:11:19 OPSO sshd\[32061\]: Failed password for invalid user www from 182.72.207.148 port 44647 ssh2
Nov 24 02:18:36 OPSO sshd\[1507\]: Invalid user brunette from 182.72.207.148 port 34986
Nov 24 02:18:36 OPSO sshd\[1507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.207.148
2019-11-24 09:30:53
197.232.47.210 attackbotsspam
Nov 24 02:51:38 vpn01 sshd[5157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.232.47.210
Nov 24 02:51:40 vpn01 sshd[5157]: Failed password for invalid user guest from 197.232.47.210 port 46491 ssh2
...
2019-11-24 09:52:34
151.84.105.118 attackspam
Nov 24 01:42:57 hosting sshd[14791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.84.105.118  user=root
Nov 24 01:42:59 hosting sshd[14791]: Failed password for root from 151.84.105.118 port 40380 ssh2
...
2019-11-24 09:16:09
219.159.239.77 attackspam
2019-11-23T23:40:16.385915shield sshd\[28409\]: Invalid user encrypte from 219.159.239.77 port 60060
2019-11-23T23:40:16.390223shield sshd\[28409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.159.239.77
2019-11-23T23:40:18.645367shield sshd\[28409\]: Failed password for invalid user encrypte from 219.159.239.77 port 60060 ssh2
2019-11-23T23:47:29.687764shield sshd\[29963\]: Invalid user guest2222 from 219.159.239.77 port 39010
2019-11-23T23:47:29.692043shield sshd\[29963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.159.239.77
2019-11-24 09:28:57
42.116.255.216 attackspam
Nov 23 12:09:09 server sshd\[20659\]: Failed password for invalid user martin from 42.116.255.216 port 43038 ssh2
Nov 23 18:30:32 server sshd\[22278\]: Invalid user setup from 42.116.255.216
Nov 23 18:30:32 server sshd\[22278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.116.255.216 
Nov 23 18:30:34 server sshd\[22278\]: Failed password for invalid user setup from 42.116.255.216 port 38914 ssh2
Nov 24 04:27:32 server sshd\[18420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.116.255.216  user=root
...
2019-11-24 09:30:42
129.213.153.229 attack
Nov 23 23:42:46 lnxmysql61 sshd[4901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.153.229
Nov 23 23:42:46 lnxmysql61 sshd[4901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.153.229
2019-11-24 09:27:39
117.50.13.170 attackbots
ssh failed login
2019-11-24 09:31:34
103.248.25.171 attack
Nov 23 14:57:59 hpm sshd\[13909\]: Invalid user leroi from 103.248.25.171
Nov 23 14:57:59 hpm sshd\[13909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.248.25.171
Nov 23 14:58:01 hpm sshd\[13909\]: Failed password for invalid user leroi from 103.248.25.171 port 38968 ssh2
Nov 23 15:05:30 hpm sshd\[14517\]: Invalid user parhi from 103.248.25.171
Nov 23 15:05:30 hpm sshd\[14517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.248.25.171
2019-11-24 09:22:27
146.185.162.244 attack
IP blocked
2019-11-24 09:52:59
119.41.167.125 attackbots
11/23/2019-17:42:53.095928 119.41.167.125 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-24 09:23:55
139.59.34.227 attackspambots
Lines containing failures of 139.59.34.227
Nov 21 22:35:53 icinga sshd[25330]: Invalid user guilmette from 139.59.34.227 port 53536
Nov 21 22:35:53 icinga sshd[25330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.34.227
Nov 21 22:35:55 icinga sshd[25330]: Failed password for invalid user guilmette from 139.59.34.227 port 53536 ssh2
Nov 21 22:35:56 icinga sshd[25330]: Received disconnect from 139.59.34.227 port 53536:11: Bye Bye [preauth]
Nov 21 22:35:56 icinga sshd[25330]: Disconnected from invalid user guilmette 139.59.34.227 port 53536 [preauth]
Nov 21 22:47:40 icinga sshd[28485]: Invalid user wwwadmin from 139.59.34.227 port 35030
Nov 21 22:47:40 icinga sshd[28485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.34.227
Nov 21 22:47:42 icinga sshd[28485]: Failed password for invalid user wwwadmin from 139.59.34.227 port 35030 ssh2
Nov 21 22:47:43 icinga sshd[28485]: Receiv........
------------------------------
2019-11-24 09:31:53
223.149.38.30 attackspambots
badbot
2019-11-24 09:28:22
114.231.242.240 attackbots
badbot
2019-11-24 09:53:15

Recently Reported IPs

231.122.179.255 247.254.242.68 155.185.160.178 19.160.3.56
208.25.107.195 117.75.254.107 84.211.51.139 137.130.106.157
190.206.173.93 244.118.27.6 253.166.220.193 143.208.64.209
144.103.43.122 46.85.192.54 78.143.228.105 175.123.106.239
79.12.47.103 49.90.83.201 243.127.82.193 23.239.193.224