Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.136.27.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12516
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.136.27.45.			IN	A

;; AUTHORITY SECTION:
.			543	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 14:43:30 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 45.27.136.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.27.136.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
175.119.91.146 attackspam
Unauthorised access (Nov 28) SRC=175.119.91.146 LEN=40 TTL=51 ID=53715 TCP DPT=23 WINDOW=15331 SYN 
Unauthorised access (Nov 27) SRC=175.119.91.146 LEN=40 TTL=51 ID=11174 TCP DPT=23 WINDOW=28693 SYN
2019-11-29 00:43:52
37.123.114.120 attackbotsspam
[portscan] Port scan
2019-11-29 00:11:39
71.6.232.6 attackspambots
3389BruteforceFW23
2019-11-29 00:08:34
188.48.240.110 attack
Brute force SMTP login attempts.
2019-11-29 00:12:35
37.120.143.163 attackbots
0,34-03/02 [bc08/m133] PostRequest-Spammer scoring: essen
2019-11-29 00:04:38
212.48.85.60 attackspam
212.48.85.60 - - [28/Nov/2019:15:37:35 +0100] "GET /wp-login.php HTTP/1.1" 200 1896 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.48.85.60 - - [28/Nov/2019:15:37:35 +0100] "POST /wp-login.php HTTP/1.1" 200 2294 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.48.85.60 - - [28/Nov/2019:15:37:35 +0100] "GET /wp-login.php HTTP/1.1" 200 1896 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.48.85.60 - - [28/Nov/2019:15:37:35 +0100] "POST /wp-login.php HTTP/1.1" 200 2268 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.48.85.60 - - [28/Nov/2019:15:37:35 +0100] "GET /wp-login.php HTTP/1.1" 200 1896 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.48.85.60 - - [28/Nov/2019:15:37:35 +0100] "POST /wp-login.php HTTP/1.1" 200 2269 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-11-29 00:46:41
41.208.150.114 attackbotsspam
Nov 28 06:23:12 hpm sshd\[28568\]: Invalid user eikenes from 41.208.150.114
Nov 28 06:23:12 hpm sshd\[28568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.208.150.114
Nov 28 06:23:14 hpm sshd\[28568\]: Failed password for invalid user eikenes from 41.208.150.114 port 49612 ssh2
Nov 28 06:30:49 hpm sshd\[29946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.208.150.114  user=root
Nov 28 06:30:52 hpm sshd\[29946\]: Failed password for root from 41.208.150.114 port 50710 ssh2
2019-11-29 00:31:56
49.88.112.116 attackspam
Nov 28 16:41:56 localhost sshd\[29644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116  user=root
Nov 28 16:41:58 localhost sshd\[29644\]: Failed password for root from 49.88.112.116 port 29677 ssh2
Nov 28 16:42:00 localhost sshd\[29644\]: Failed password for root from 49.88.112.116 port 29677 ssh2
2019-11-29 00:13:00
162.243.78.241 attackbots
162.243.78.241 - - \[28/Nov/2019:14:37:27 +0000\] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
162.243.78.241 - - \[28/Nov/2019:14:37:27 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-29 00:48:43
124.74.248.218 attackspambots
Nov 28 17:21:31 legacy sshd[1075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218
Nov 28 17:21:33 legacy sshd[1075]: Failed password for invalid user huichaun from 124.74.248.218 port 33454 ssh2
Nov 28 17:25:39 legacy sshd[1214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218
...
2019-11-29 00:32:22
106.12.93.160 attack
Nov 28 17:22:43 [host] sshd[8841]: Invalid user 7890 from 106.12.93.160
Nov 28 17:22:43 [host] sshd[8841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.160
Nov 28 17:22:45 [host] sshd[8841]: Failed password for invalid user 7890 from 106.12.93.160 port 50048 ssh2
2019-11-29 00:47:36
222.186.173.183 attackbots
Nov 28 17:28:54 SilenceServices sshd[1609]: Failed password for root from 222.186.173.183 port 50228 ssh2
Nov 28 17:29:04 SilenceServices sshd[1609]: Failed password for root from 222.186.173.183 port 50228 ssh2
Nov 28 17:29:07 SilenceServices sshd[1609]: Failed password for root from 222.186.173.183 port 50228 ssh2
Nov 28 17:29:07 SilenceServices sshd[1609]: error: maximum authentication attempts exceeded for root from 222.186.173.183 port 50228 ssh2 [preauth]
2019-11-29 00:31:06
218.234.206.107 attackbots
Nov 28 23:09:56 webhost01 sshd[4261]: Failed password for root from 218.234.206.107 port 58192 ssh2
...
2019-11-29 00:14:33
120.29.159.162 attackbotsspam
Nov 28 14:37:48 system,error,critical: login failure for user admin from 120.29.159.162 via telnet
Nov 28 14:37:49 system,error,critical: login failure for user root from 120.29.159.162 via telnet
Nov 28 14:37:50 system,error,critical: login failure for user root from 120.29.159.162 via telnet
Nov 28 14:37:51 system,error,critical: login failure for user root from 120.29.159.162 via telnet
Nov 28 14:37:52 system,error,critical: login failure for user admin from 120.29.159.162 via telnet
Nov 28 14:37:53 system,error,critical: login failure for user root from 120.29.159.162 via telnet
Nov 28 14:37:55 system,error,critical: login failure for user admin from 120.29.159.162 via telnet
Nov 28 14:37:56 system,error,critical: login failure for user root from 120.29.159.162 via telnet
Nov 28 14:37:57 system,error,critical: login failure for user root from 120.29.159.162 via telnet
Nov 28 14:37:58 system,error,critical: login failure for user administrator from 120.29.159.162 via telnet
2019-11-29 00:40:11
2.59.132.26 attackspam
Nov 28 16:58:24 novum-srv2 sshd[16796]: Invalid user test from 2.59.132.26 port 33408
Nov 28 17:00:28 novum-srv2 sshd[16873]: Invalid user test from 2.59.132.26 port 35356
Nov 28 17:02:23 novum-srv2 sshd[16915]: Invalid user jenkins from 2.59.132.26 port 37760
...
2019-11-29 00:30:16

Recently Reported IPs

169.177.165.184 155.143.65.227 186.192.213.169 134.217.71.31
2.211.129.87 157.105.164.77 156.138.223.110 122.39.139.155
154.197.61.236 232.0.26.102 119.122.213.254 135.37.216.146
135.54.68.55 180.243.32.61 144.4.161.237 161.220.21.136
251.71.139.61 125.10.56.184 148.24.48.60 164.204.186.95