Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.64.55.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28232
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.64.55.245.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 15:44:33 CST 2025
;; MSG SIZE  rcvd: 106
Host info
245.55.64.116.in-addr.arpa domain name pointer 116-64-55-245.rev.home.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
245.55.64.116.in-addr.arpa	name = 116-64-55-245.rev.home.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.99.245.235 attackspambots
SSH Bruteforce Attack
2019-07-31 06:10:34
119.50.22.219 attackbots
23/tcp
[2019-07-30]1pkt
2019-07-31 05:47:19
113.105.223.90 attackbotsspam
445/tcp
[2019-07-30]1pkt
2019-07-31 06:03:35
125.64.94.220 attackspam
Port scan on 7 port(s): 2306 3002 15001 16992 20000 60030 64210
2019-07-31 05:55:48
36.83.40.165 attack
445/tcp
[2019-07-30]1pkt
2019-07-31 05:46:25
113.221.29.21 attackspam
TCP port 23 (Telnet) attempt blocked by firewall. [2019-07-30 14:06:34]
2019-07-31 06:26:51
84.60.2.156 attackspambots
Spam Timestamp : 30-Jul-19 12:28 _ BlockList Provider  combined abuse _ (836)
2019-07-31 06:04:40
188.128.39.129 attack
Jul 30 08:11:28 debian sshd\[735\]: Invalid user test from 188.128.39.129 port 56782
Jul 30 08:11:28 debian sshd\[735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.39.129
Jul 30 08:11:30 debian sshd\[735\]: Failed password for invalid user test from 188.128.39.129 port 56782 ssh2
...
2019-07-31 06:19:35
176.241.95.119 attackbots
23/tcp
[2019-07-30]1pkt
2019-07-31 05:47:54
112.246.99.140 attackspambots
52869/tcp
[2019-07-30]1pkt
2019-07-31 05:51:25
86.92.15.107 attack
Received: from mail.planet.nl (unknown [86.92.15.107])
	by smtp.kpnmail.nl (Halon) with SMTP
2019-07-31 06:24:33
213.55.95.150 attackspambots
Unauthorised access (Jul 30) SRC=213.55.95.150 LEN=52 TTL=112 ID=6749 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-31 06:04:22
195.223.54.18 attack
Jul 30 23:18:41 h2177944 sshd\[31232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.223.54.18
Jul 30 23:18:43 h2177944 sshd\[31232\]: Failed password for invalid user africa from 195.223.54.18 port 10687 ssh2
Jul 31 00:19:00 h2177944 sshd\[1188\]: Invalid user dim from 195.223.54.18 port 39664
Jul 31 00:19:00 h2177944 sshd\[1188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.223.54.18
...
2019-07-31 06:21:53
39.105.155.250 attack
8545/tcp
[2019-07-30]1pkt
2019-07-31 06:12:42
82.42.153.32 attackspambots
Spam Timestamp : 30-Jul-19 12:22 _ BlockList Provider  combined abuse _ (832)
2019-07-31 06:09:36

Recently Reported IPs

218.249.81.165 88.129.60.130 154.192.49.188 161.41.139.86
149.83.200.105 83.76.130.39 153.122.137.163 145.171.235.32
106.253.159.140 68.67.69.201 25.100.144.245 176.14.98.64
145.31.223.90 53.65.51.49 165.55.146.248 145.86.179.52
178.224.249.139 16.19.54.24 142.177.104.118 234.164.23.64