Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.202.216.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40003
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.202.216.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 23:47:03 CST 2025
;; MSG SIZE  rcvd: 107
Host info
45.216.202.116.in-addr.arpa domain name pointer static.45.216.202.116.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.216.202.116.in-addr.arpa	name = static.45.216.202.116.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.79.142.178 attackspam
Automatic report - Port Scan
2019-11-09 00:52:07
139.59.66.192 attackbotsspam
Nov  8 12:41:41 firewall sshd[2124]: Failed password for invalid user service from 139.59.66.192 port 38288 ssh2
Nov  8 12:46:10 firewall sshd[2243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.192  user=root
Nov  8 12:46:11 firewall sshd[2243]: Failed password for root from 139.59.66.192 port 48542 ssh2
...
2019-11-09 00:35:34
202.72.215.59 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/202.72.215.59/ 
 
 ID - 1H : (24)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ID 
 NAME ASN : ASN23953 
 
 IP : 202.72.215.59 
 
 CIDR : 202.72.215.0/24 
 
 PREFIX COUNT : 45 
 
 UNIQUE IP COUNT : 11520 
 
 
 ATTACKS DETECTED ASN23953 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-08 15:39:30 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-09 00:33:34
34.93.149.4 attack
Invalid user server from 34.93.149.4 port 57684
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.93.149.4
Failed password for invalid user server from 34.93.149.4 port 57684 ssh2
Invalid user NetLinx from 34.93.149.4 port 38370
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.93.149.4
2019-11-09 00:49:39
121.32.133.178 attack
11/08/2019-15:38:37.704451 121.32.133.178 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-09 01:14:43
106.12.202.192 attack
Nov  8 17:42:15 serwer sshd\[17595\]: Invalid user pbsdata from 106.12.202.192 port 51252
Nov  8 17:42:15 serwer sshd\[17595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.192
Nov  8 17:42:17 serwer sshd\[17595\]: Failed password for invalid user pbsdata from 106.12.202.192 port 51252 ssh2
...
2019-11-09 00:48:13
51.83.74.203 attackbotsspam
Nov  8 15:31:02 vpn01 sshd[9345]: Failed password for root from 51.83.74.203 port 57894 ssh2
...
2019-11-09 01:05:10
222.186.175.140 attackbotsspam
2019-11-08T16:54:05.577347abusebot-5.cloudsearch.cf sshd\[1960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140  user=root
2019-11-09 00:56:56
142.93.133.55 attack
Nov  8 16:20:47 MK-Soft-Root1 sshd[29850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.133.55 
Nov  8 16:20:49 MK-Soft-Root1 sshd[29850]: Failed password for invalid user admin from 142.93.133.55 port 7176 ssh2
...
2019-11-09 01:01:58
54.213.233.46 attackspam
2019-11-08 08:39:38 H=ec2-54-213-233-46.us-west-2.compute.amazonaws.com (phylobago.mysecuritycamera.org) [54.213.233.46]:49731 I=[192.147.25.65]:25 sender verify fail for : Unrouteable address
2019-11-08 08:39:38 H=ec2-54-213-233-46.us-west-2.compute.amazonaws.com (phylobago.mysecuritycamera.org) [54.213.233.46]:49731 I=[192.147.25.65]:25 F= rejected RCPT : Sender verify failed
2019-11-08 08:39:38 H=ec2-54-213-233-46.us-west-2.compute.amazonaws.com (phylobago.mysecuritycamera.org) [54.213.233.46]:49731 I=[192.147.25.65]:25 sender verify fail for : Unrouteable address
2019-11-08 08:39:38 H=ec2-54-213-233-46.us-west-2.compute.amazonaws.com (phylobago.mysecuritycamera.org) [54.213.233.46]:49731 I=[192.147.25.65]:25 F= rejected RCPT : Sender verify failed
...
2019-11-09 00:31:02
178.62.36.116 attackspambots
Nov  8 17:49:39 vps01 sshd[12010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.36.116
Nov  8 17:49:41 vps01 sshd[12010]: Failed password for invalid user 123 from 178.62.36.116 port 51114 ssh2
2019-11-09 01:05:29
42.114.137.151 attackbotsspam
Brute force SMTP login attempts.
2019-11-09 01:08:37
23.108.48.44 attack
(From eric@talkwithcustomer.com) Hi,

My name is Eric and I was looking at a few different sites online and came across your site decubellisfamilychiropractic.com.  I must say - your website is very impressive.  I am seeing your website on the first page of the Search Engine. 

Have you noticed that 70 percent of visitors who leave your website will never return?  In most cases, this means that 95 percent to 98 percent of your marketing efforts are going to waste, not to mention that you are losing more money in customer acquisition costs than you need to.
 
As a business person, the time and money you put into your marketing efforts is extremely valuable.  So why let it go to waste?  Our users have seen staggering improvements in conversions with insane growths of 150 percent going upwards of 785 percent. Are you ready to unlock the highest conversion revenue from each of your website visitors?  

TalkWithCustomer is a widget which captures a website visitor’s Name, Email address and Phone Number and
2019-11-09 00:40:28
222.186.180.8 attackspam
2019-11-08T17:59:01.042110lon01.zurich-datacenter.net sshd\[21134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
2019-11-08T17:59:03.328097lon01.zurich-datacenter.net sshd\[21134\]: Failed password for root from 222.186.180.8 port 50958 ssh2
2019-11-08T17:59:07.752239lon01.zurich-datacenter.net sshd\[21134\]: Failed password for root from 222.186.180.8 port 50958 ssh2
2019-11-08T17:59:12.048735lon01.zurich-datacenter.net sshd\[21134\]: Failed password for root from 222.186.180.8 port 50958 ssh2
2019-11-08T17:59:16.708563lon01.zurich-datacenter.net sshd\[21134\]: Failed password for root from 222.186.180.8 port 50958 ssh2
...
2019-11-09 01:00:16
103.254.198.67 attackbots
Nov  8 17:42:48 [host] sshd[10565]: Invalid user news123 from 103.254.198.67
Nov  8 17:42:48 [host] sshd[10565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.254.198.67
Nov  8 17:42:50 [host] sshd[10565]: Failed password for invalid user news123 from 103.254.198.67 port 59357 ssh2
2019-11-09 01:03:48

Recently Reported IPs

137.105.64.139 158.76.8.83 169.167.238.174 103.201.95.75
53.198.117.112 92.145.49.28 30.36.102.129 134.29.207.50
28.65.55.116 41.83.111.29 81.136.219.40 205.139.111.128
21.228.231.117 80.109.211.49 218.111.113.197 65.83.48.44
13.165.14.80 9.18.8.181 175.42.70.244 114.116.51.176