Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.64.149.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.64.149.45.			IN	A

;; AUTHORITY SECTION:
.			185	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 21:44:08 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 45.149.64.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.149.64.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.229.167.10 attack
SSH Brute-Force. Ports scanning.
2020-06-18 03:27:37
89.67.15.123 attack
Invalid user pi from 89.67.15.123 port 40918
2020-06-18 03:32:16
36.110.49.98 attack
Jun 17 18:47:24 ws26vmsma01 sshd[136424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.49.98
Jun 17 18:47:26 ws26vmsma01 sshd[136424]: Failed password for invalid user probe from 36.110.49.98 port 4610 ssh2
...
2020-06-18 03:17:45
118.24.115.200 attackspambots
Invalid user admin from 118.24.115.200 port 58386
2020-06-18 03:46:34
23.254.70.96 attack
Stealing accounts
2020-06-18 03:19:53
82.165.65.108 attack
Invalid user admin from 82.165.65.108 port 45312
2020-06-18 03:13:48
144.172.73.38 attackspam
Jun 17 21:40:23 mail sshd[10922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.172.73.38
Jun 17 21:40:25 mail sshd[10922]: Failed password for invalid user honey from 144.172.73.38 port 53246 ssh2
...
2020-06-18 03:44:04
110.74.196.152 attack
SSH/22 MH Probe, BF, Hack -
2020-06-18 03:46:49
58.230.147.230 attackspambots
DATE:2020-06-17 19:24:42,IP:58.230.147.230,MATCHES:11,PORT:ssh
2020-06-18 03:33:44
103.104.119.191 attackspam
Invalid user ama from 103.104.119.191 port 44762
2020-06-18 03:30:13
106.12.99.204 attack
Bruteforce detected by fail2ban
2020-06-18 03:47:04
183.92.214.38 attackspam
$f2bV_matches
2020-06-18 03:21:52
159.203.72.14 attackbots
2020-06-17T19:26:38.445841shield sshd\[14540\]: Invalid user jo from 159.203.72.14 port 50584
2020-06-17T19:26:38.449707shield sshd\[14540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.72.14
2020-06-17T19:26:40.085423shield sshd\[14540\]: Failed password for invalid user jo from 159.203.72.14 port 50584 ssh2
2020-06-17T19:30:45.066147shield sshd\[15175\]: Invalid user ubuntu from 159.203.72.14 port 51558
2020-06-17T19:30:45.069957shield sshd\[15175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.72.14
2020-06-18 03:43:16
167.250.127.235 attackbotsspam
Invalid user axente from 167.250.127.235 port 16853
2020-06-18 03:24:12
122.51.136.128 attackbots
Jun 17 19:58:19 mail sshd\[20514\]: Invalid user zxl from 122.51.136.128
Jun 17 19:58:19 mail sshd\[20514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.136.128
Jun 17 19:58:21 mail sshd\[20514\]: Failed password for invalid user zxl from 122.51.136.128 port 56426 ssh2
...
2020-06-18 03:25:41

Recently Reported IPs

117.64.149.234 117.64.149.5 117.64.149.56 117.64.149.63
117.64.149.66 117.64.149.33 117.64.149.79 117.64.149.8
117.64.152.121 117.64.149.97 114.226.89.155 117.64.149.235
117.64.155.69 117.64.153.1 117.64.149.254 117.64.155.23
117.64.155.72 117.64.156.5 117.64.153.179 117.64.157.248