Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '163.0.0.0 - 163.255.255.255'

% Abuse contact for '163.0.0.0 - 163.255.255.255' is 'helpdesk@apnic.net'

inetnum:        163.0.0.0 - 163.255.255.255
netname:        ERX-NETBLOCK
descr:          Early registration addresses
country:        AU
admin-c:        IANA1-AP
tech-c:         IANA1-AP
abuse-c:        AA1452-AP
status:         ALLOCATED PORTABLE
remarks:        ------------------------------------------------------
remarks:        Important:
remarks:
remarks:        Networks in this range were allocated by InterNIC
remarks:        prior to the formation of Regional Internet
remarks:        Registries (RIRs): AfriNIC, APNIC, ARIN, LACNIC and RIPE NCC.
remarks:
remarks:        Address ranges from this historical space have now
remarks:        been transferred to the appropriate RIR database.remarks:
remarks:        If your search has returned this record, it means the
remarks:        address range is not administered by APNIC.
remarks:
remarks:        Instead, please search one of the following databases:
remarks:
remarks:        - AfriNIC (Africa)
remarks:        website: http://www.afrinic.net/
remarks:        command line: whois.afrinic.net
remarks:
remarks:        - ARIN (Northern America)
remarks:        website: http://www.arin.net/
remarks:        command line: whois.arin.net
remarks:
remarks:        - LACNIC (Latin America and the Carribean)
remarks:        website: http://www.lacnic.net/
remarks:        command line: whois.lacnic.net
remarks:
remarks:        - RIPE NCC (Europe)
remarks:        website: http://www.ripe.net/
remarks:        command line: whois.ripe.net
remarks:
remarks:        For information on the Early Registration Transfer
remarks:        (ERX) project, see:
remarks:
remarks:        http://www.apnic.net/db/erx
remarks:
remarks:        ------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      APNIC-HM
mnt-irt:        IRT-APNIC-AP
last-modified:  2021-04-16T06:53:35Z
source:         APNIC

irt:            IRT-APNIC-AP
address:        Brisbane, Australia
e-mail:         helpdesk@apnic.net
abuse-mailbox:  helpdesk@apnic.net
admin-c:        HM20-AP
tech-c:         NO4-AP
remarks:        APNIC is a Regional Internet Registry.
remarks:        We do not operate the referring network and
remarks:        are unable to investigate complaints of network abuse.
remarks:        For information about IRT, see www.apnic.net/irt
remarks:        helpdesk@apnic.net was validated on 2020-02-03
auth:           # Filtered
mnt-by:         APNIC-HM
last-modified:  2025-11-18T00:26:21Z
source:         APNIC

role:           ABUSE APNICAP
country:        ZZ
address:        Brisbane, Australia
phone:          +000000000
e-mail:         helpdesk@apnic.net
admin-c:        HM20-AP
tech-c:         NO4-AP
nic-hdl:        AA1452-AP
remarks:        Generated from irt object IRT-APNIC-AP
remarks:        helpdesk@apnic.net was validated on 2020-02-03
abuse-mailbox:  helpdesk@apnic.net
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-28T01:00:58Z
source:         APNIC

role:           Internet Assigned Numbers Authority
address:        see http://www.iana.org.
admin-c:        IANA1-AP
tech-c:         IANA1-AP
nic-hdl:        IANA1-AP
remarks:        For more information on IANA services
remarks:        go to IANA web site at http://www.iana.org.
mnt-by:         MAINT-APNIC-AP
last-modified:  2018-06-22T22:34:30Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.245.222.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12350
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.245.222.252.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051600 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 16 19:01:41 CST 2026
;; MSG SIZE  rcvd: 108
Host info
252.222.245.163.in-addr.arpa domain name pointer vps3385693.trouble-free.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
252.222.245.163.in-addr.arpa	name = vps3385693.trouble-free.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.32.165 attackbotsspam
SSH invalid-user multiple login attempts
2020-04-12 01:47:33
189.16.131.130 attackspam
Unauthorized connection attempt from IP address 189.16.131.130 on Port 445(SMB)
2020-04-12 01:38:40
206.189.165.94 attackspam
prod11
...
2020-04-12 01:35:53
60.249.3.49 attackspam
" "
2020-04-12 01:42:15
185.153.196.230 attack
Apr 11 16:25:57 ift sshd\[35529\]: Invalid user 0 from 185.153.196.230Apr 11 16:25:58 ift sshd\[35529\]: Failed password for invalid user 0 from 185.153.196.230 port 56817 ssh2Apr 11 16:26:02 ift sshd\[35531\]: Invalid user 22 from 185.153.196.230Apr 11 16:26:04 ift sshd\[35531\]: Failed password for invalid user 22 from 185.153.196.230 port 3039 ssh2Apr 11 16:26:07 ift sshd\[35531\]: Failed password for invalid user 22 from 185.153.196.230 port 3039 ssh2
...
2020-04-12 01:41:06
45.235.98.80 attackspambots
1586607332 - 04/11/2020 14:15:32 Host: 45.235.98.80/45.235.98.80 Port: 445 TCP Blocked
2020-04-12 01:46:07
111.51.65.33 attackbotsspam
Unauthorized connection attempt detected from IP address 111.51.65.33 to port 22 [T]
2020-04-12 01:31:03
80.82.77.139 attackspam
Unauthorized connection attempt detected from IP address 80.82.77.139 to port 8112
2020-04-12 01:23:35
189.146.45.243 attack
Unauthorized connection attempt from IP address 189.146.45.243 on Port 445(SMB)
2020-04-12 01:32:16
103.48.192.203 attackbotsspam
103.48.192.203 - - \[11/Apr/2020:14:15:28 +0200\] "POST /wp-login.php HTTP/1.0" 200 4128 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.48.192.203 - - \[11/Apr/2020:14:15:30 +0200\] "POST /wp-login.php HTTP/1.0" 200 3955 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.48.192.203 - - \[11/Apr/2020:14:15:31 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-04-12 01:45:28
162.243.128.227 attackbots
8022/tcp 4840/tcp 1028/tcp...
[2020-02-12/04-11]31pkt,25pt.(tcp),2pt.(udp)
2020-04-12 01:17:11
36.22.187.34 attackbots
Apr 11 14:44:11 silence02 sshd[9384]: Failed password for root from 36.22.187.34 port 41592 ssh2
Apr 11 14:46:47 silence02 sshd[9587]: Failed password for root from 36.22.187.34 port 42354 ssh2
Apr 11 14:49:10 silence02 sshd[9737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.22.187.34
2020-04-12 01:11:25
147.135.157.67 attackbotsspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-04-12 01:43:02
104.129.4.186 attackbotsspam
2020-04-11 11:00:27 H=(Kbo0pV94) [104.129.4.186]:56097 I=[192.147.25.65]:25 F= rejected RCPT : Sender verify failed
2020-04-11 11:00:40 dovecot_login authenticator failed for (nQl8360cVx) [104.129.4.186]:49616 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=habu@lerctr.org)
2020-04-11 11:00:56 dovecot_login authenticator failed for (G83zUl) [104.129.4.186]:50957 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=habu@lerctr.org)
...
2020-04-12 01:34:37
223.206.223.239 attack
Unauthorized connection attempt from IP address 223.206.223.239 on Port 445(SMB)
2020-04-12 01:53:55

Recently Reported IPs

2606:4700:10::ac43:2412 2606:4700:10::6816:3232 2606:4700:10::6814:8453 2606:4700:10::6814:6146
43.153.205.132 131.153.168.218 92.63.197.47 109.162.246.42
118.8.133.156 43.134.1.185 203.25.78.103 246.40.56.158
48.45.206.112 2606:4700:10::6814:8798 2606:4700:10::ac43:2252 168.231.115.182
223.75.227.182 168.231.115.148 43.153.205.71 161.97.184.127