Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.213.53.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6635
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;160.213.53.46.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 23:27:31 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 46.53.213.160.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 46.53.213.160.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.68.214.213 attackbotsspam
(sshd) Failed SSH login from 51.68.214.213 (GB/United Kingdom/213.ip-51-68-214.eu): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 20 15:14:40 ubnt-55d23 sshd[10846]: Invalid user test from 51.68.214.213 port 39274
Apr 20 15:14:42 ubnt-55d23 sshd[10846]: Failed password for invalid user test from 51.68.214.213 port 39274 ssh2
2020-04-21 00:54:35
202.137.154.77 attack
Invalid user admin from 202.137.154.77 port 47479
2020-04-21 01:13:11
2.229.164.209 attackbots
Apr 20 11:43:18 dns1 sshd[24376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.229.164.209 
Apr 20 11:43:20 dns1 sshd[24376]: Failed password for invalid user vw from 2.229.164.209 port 60740 ssh2
Apr 20 11:51:59 dns1 sshd[25012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.229.164.209
2020-04-21 01:07:39
49.84.233.37 attack
SSH login attempts.
2020-04-21 00:58:22
75.130.124.90 attackspambots
fail2ban -- 75.130.124.90
...
2020-04-21 00:45:41
206.189.146.48 attackbots
Invalid user yw from 206.189.146.48 port 54778
2020-04-21 01:12:09
91.96.241.235 attack
Invalid user pi from 91.96.241.235 port 53448
2020-04-21 00:41:30
197.248.18.203 attackbots
Invalid user admin from 197.248.18.203 port 43677
2020-04-21 01:14:20
93.95.240.245 attackbots
Invalid user pi from 93.95.240.245 port 48250
2020-04-21 00:37:46
92.63.194.11 attackspam
SSH login attempts.
2020-04-21 00:40:40
62.33.140.2 attack
Invalid user backups from 62.33.140.2 port 6922
2020-04-21 00:48:06
218.93.194.242 attackbots
2020-04-20T18:11:34.193753librenms sshd[1555]: Invalid user admin from 218.93.194.242 port 59336
2020-04-20T18:11:35.926268librenms sshd[1555]: Failed password for invalid user admin from 218.93.194.242 port 59336 ssh2
2020-04-20T18:17:32.948145librenms sshd[2050]: Invalid user admin from 218.93.194.242 port 33857
...
2020-04-21 01:08:33
51.83.75.56 attackbots
2020-04-20T10:39:36.298197mail.thespaminator.com sshd[9754]: Invalid user git from 51.83.75.56 port 58874
2020-04-20T10:39:40.239481mail.thespaminator.com sshd[9754]: Failed password for invalid user git from 51.83.75.56 port 58874 ssh2
...
2020-04-21 00:52:58
92.63.194.90 attackspambots
Invalid user 1234 from 92.63.194.90 port 58528
2020-04-21 00:38:47
81.169.248.234 attackbots
Apr 20 10:37:21 debian sshd[25351]: Unable to negotiate with 81.169.248.234 port 60937: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
Apr 20 11:34:00 debian sshd[28085]: Unable to negotiate with 81.169.248.234 port 60937: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
...
2020-04-21 00:44:17

Recently Reported IPs

78.232.231.12 61.73.27.201 166.141.139.63 5.128.183.154
27.187.230.4 5.167.160.145 80.137.22.193 215.250.143.229
29.171.41.222 34.4.245.111 26.213.82.247 8.149.229.17
226.172.135.127 239.186.215.127 215.224.254.57 247.17.138.69
168.212.249.16 2.160.201.163 62.216.177.156 199.84.26.246