Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.45.107.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3066
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;16.45.107.71.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030300 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 03 23:11:49 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 71.107.45.16.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 71.107.45.16.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.165 attackspambots
Sep 24 00:26:33 ns308116 sshd[27292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.165  user=root
Sep 24 00:26:35 ns308116 sshd[27292]: Failed password for root from 218.92.0.165 port 7949 ssh2
Sep 24 00:26:38 ns308116 sshd[27292]: Failed password for root from 218.92.0.165 port 7949 ssh2
Sep 24 00:26:41 ns308116 sshd[27292]: Failed password for root from 218.92.0.165 port 7949 ssh2
Sep 24 00:26:44 ns308116 sshd[27292]: Failed password for root from 218.92.0.165 port 7949 ssh2
...
2020-09-24 07:27:26
94.102.57.177 attackbots
Multiport scan : 281 ports scanned 24004 24005 24007 24009 24011 24013 24022 24024 24039 24055 24057 24062 24064 24067 24069 24071 24072 24075 24078 24080 24081 24085 24089 24094 24101 24104 24105 24106 24108 24110 24116 24118 24122 24123 24127 24130 24146 24158 24180 24182 24190 24191 24192 24194 24195 24197 24202 24204 24209 24212 24214 24215 24225 24227 24229 24232 24235 24238 24239 24241 24250 24252 24253 24259 24261 24266 24268 .....
2020-09-24 07:32:10
103.62.232.234 attackspam
Unauthorized connection attempt from IP address 103.62.232.234 on Port 445(SMB)
2020-09-24 06:58:02
88.151.179.66 attackbots
Unauthorized connection attempt from IP address 88.151.179.66 on Port 445(SMB)
2020-09-24 07:24:31
46.35.19.18 attackbots
Sep 23 19:22:56 mavik sshd[4791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.35.19.18
Sep 23 19:22:59 mavik sshd[4791]: Failed password for invalid user admin from 46.35.19.18 port 49376 ssh2
Sep 23 19:28:49 mavik sshd[5009]: Invalid user q from 46.35.19.18
Sep 23 19:28:49 mavik sshd[5009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.35.19.18
Sep 23 19:28:51 mavik sshd[5009]: Failed password for invalid user q from 46.35.19.18 port 54701 ssh2
...
2020-09-24 07:34:14
178.74.102.1 attack
Unauthorized connection attempt from IP address 178.74.102.1 on Port 445(SMB)
2020-09-24 07:11:30
117.50.7.14 attackbots
Invalid user wang from 117.50.7.14 port 51776
2020-09-24 07:02:42
190.200.228.69 attackspambots
Unauthorised access (Sep 23) SRC=190.200.228.69 LEN=52 TTL=113 ID=8078 DF TCP DPT=445 WINDOW=8192 SYN
2020-09-24 07:22:58
113.172.164.254 attackbots
(eximsyntax) Exim syntax errors from 113.172.164.254 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-09-23 20:32:20 SMTP call from [113.172.164.254] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f?	?")
2020-09-24 07:26:09
139.199.45.83 attackspambots
(sshd) Failed SSH login from 139.199.45.83 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 23 15:37:10 server5 sshd[20109]: Invalid user apps from 139.199.45.83
Sep 23 15:37:10 server5 sshd[20109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 
Sep 23 15:37:12 server5 sshd[20109]: Failed password for invalid user apps from 139.199.45.83 port 51344 ssh2
Sep 23 15:49:28 server5 sshd[25497]: Invalid user ts3user from 139.199.45.83
Sep 23 15:49:28 server5 sshd[25497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83
2020-09-24 06:58:39
167.172.186.32 attack
167.172.186.32 - - [23/Sep/2020:22:51:53 +0100] "POST /wp-login.php HTTP/1.1" 200 2172 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.172.186.32 - - [23/Sep/2020:22:51:53 +0100] "POST /wp-login.php HTTP/1.1" 200 2199 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.172.186.32 - - [23/Sep/2020:22:51:54 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-24 07:12:01
114.104.135.60 attack
Sep 23 22:45:22 srv01 postfix/smtpd\[24920\]: warning: unknown\[114.104.135.60\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 23 22:48:53 srv01 postfix/smtpd\[24920\]: warning: unknown\[114.104.135.60\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 23 22:49:04 srv01 postfix/smtpd\[24920\]: warning: unknown\[114.104.135.60\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 23 22:49:20 srv01 postfix/smtpd\[24920\]: warning: unknown\[114.104.135.60\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 23 22:49:38 srv01 postfix/smtpd\[24920\]: warning: unknown\[114.104.135.60\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-24 07:29:59
212.70.149.20 attack
2020-09-24T01:17:46.134458www postfix/smtpd[5234]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-24T01:18:10.213487www postfix/smtpd[5234]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-24T01:18:35.058823www postfix/smtpd[5234]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-24 07:19:34
84.1.30.70 attackbotsspam
Sep 24 00:33:06 webhost01 sshd[9948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.1.30.70
Sep 24 00:33:09 webhost01 sshd[9948]: Failed password for invalid user jenkins from 84.1.30.70 port 52098 ssh2
...
2020-09-24 07:18:24
203.245.41.96 attack
Sep 23 20:56:59 vm0 sshd[16356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.245.41.96
Sep 23 20:57:01 vm0 sshd[16356]: Failed password for invalid user a from 203.245.41.96 port 54948 ssh2
...
2020-09-24 07:16:57

Recently Reported IPs

232.29.100.209 79.114.125.220 56.86.50.64 49.227.241.153
238.127.123.30 7.32.60.177 202.66.122.231 129.219.215.12
92.15.210.5 192.33.50.93 242.170.249.110 217.182.240.67
95.136.175.105 243.104.213.23 113.246.63.222 78.121.12.195
58.8.154.106 49.141.250.125 9.48.149.26 3.156.40.150