Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Crissiumal

Region: Rio Grande do Sul

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: GAÚCHA ONLINE PROVEDOR DE INTERNET LTDA

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
164.163.145.31 attackspam
Port Scan
2019-12-04 14:57:34
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.163.145.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12667
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;164.163.145.20.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 13 08:04:53 +08 2019
;; MSG SIZE  rcvd: 118

Host info
20.145.163.164.in-addr.arpa domain name pointer 164-163-145-20.gauchaonline.com.br.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
20.145.163.164.in-addr.arpa	name = 164-163-145-20.gauchaonline.com.br.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
80.82.70.118 attackbotsspam
 TCP (SYN) 80.82.70.118:60000 -> port 9200, len 44
2020-06-30 14:39:39
180.183.251.148 attack
Telnet Server BruteForce Attack
2020-06-30 14:00:17
46.38.150.72 attackspam
Jun 30 08:11:10 relay postfix/smtpd\[21935\]: warning: unknown\[46.38.150.72\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 30 08:12:54 relay postfix/smtpd\[30689\]: warning: unknown\[46.38.150.72\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 30 08:13:08 relay postfix/smtpd\[21937\]: warning: unknown\[46.38.150.72\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 30 08:13:55 relay postfix/smtpd\[27374\]: warning: unknown\[46.38.150.72\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 30 08:14:06 relay postfix/smtpd\[13561\]: warning: unknown\[46.38.150.72\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-30 14:25:55
190.36.61.10 attackspam
SMB Server BruteForce Attack
2020-06-30 14:12:22
106.13.149.227 attackbotsspam
(sshd) Failed SSH login from 106.13.149.227 (CN/China/-): 5 in the last 3600 secs
2020-06-30 14:15:50
14.244.55.91 attack
20/6/29@23:54:19: FAIL: Alarm-Intrusion address from=14.244.55.91
...
2020-06-30 14:30:58
168.121.136.164 attackspambots
Unauthorised access (Jun 30) SRC=168.121.136.164 LEN=48 TTL=107 ID=13326 DF TCP DPT=445 WINDOW=8192 SYN
2020-06-30 14:31:54
51.254.220.61 attackbotsspam
(sshd) Failed SSH login from 51.254.220.61 (FR/France/61.ip-51-254-220.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 30 06:21:31 amsweb01 sshd[11738]: Invalid user postgres from 51.254.220.61 port 39508
Jun 30 06:21:33 amsweb01 sshd[11738]: Failed password for invalid user postgres from 51.254.220.61 port 39508 ssh2
Jun 30 06:44:02 amsweb01 sshd[17100]: Invalid user flf from 51.254.220.61 port 52909
Jun 30 06:44:05 amsweb01 sshd[17100]: Failed password for invalid user flf from 51.254.220.61 port 52909 ssh2
Jun 30 06:46:26 amsweb01 sshd[17562]: Invalid user boris from 51.254.220.61 port 47045
2020-06-30 14:17:36
37.49.224.39 attackbotsspam
Jun 30 05:53:48 OPSO sshd\[29066\]: Invalid user postgres from 37.49.224.39 port 38426
Jun 30 05:53:48 OPSO sshd\[29066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.224.39
Jun 30 05:53:50 OPSO sshd\[29066\]: Failed password for invalid user postgres from 37.49.224.39 port 38426 ssh2
Jun 30 05:54:31 OPSO sshd\[29217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.224.39  user=root
Jun 30 05:54:34 OPSO sshd\[29217\]: Failed password for root from 37.49.224.39 port 35560 ssh2
2020-06-30 14:19:04
102.65.155.70 attackbotsspam
Jun 30 07:49:11 jane sshd[8363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.65.155.70 
Jun 30 07:49:13 jane sshd[8363]: Failed password for invalid user ftp from 102.65.155.70 port 42130 ssh2
...
2020-06-30 13:58:31
159.89.145.59 attack
Jun 30 07:48:57 abendstille sshd\[27380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.145.59  user=root
Jun 30 07:49:00 abendstille sshd\[27380\]: Failed password for root from 159.89.145.59 port 58422 ssh2
Jun 30 07:52:23 abendstille sshd\[31135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.145.59  user=root
Jun 30 07:52:25 abendstille sshd\[31135\]: Failed password for root from 159.89.145.59 port 58172 ssh2
Jun 30 07:55:44 abendstille sshd\[2075\]: Invalid user smtp from 159.89.145.59
Jun 30 07:55:44 abendstille sshd\[2075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.145.59
...
2020-06-30 14:32:27
113.173.216.121 attack
(eximsyntax) Exim syntax errors from 113.173.216.121 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-30 08:24:41 SMTP call from [113.173.216.121] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f?	?")
2020-06-30 14:10:21
90.230.252.43 attackbots
1593489270 - 06/30/2020 05:54:30 Host: 90.230.252.43/90.230.252.43 Port: 23 TCP Blocked
2020-06-30 14:23:34
80.211.241.165 attack
[ssh] SSH attack
2020-06-30 14:03:44
69.148.226.251 attackspam
Jun 30 05:54:01 mellenthin sshd[4134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.148.226.251
Jun 30 05:54:03 mellenthin sshd[4134]: Failed password for invalid user oratest from 69.148.226.251 port 37571 ssh2
2020-06-30 14:44:52

Recently Reported IPs

191.252.224.86 95.102.142.163 49.76.205.97 81.9.230.126
177.206.87.206 91.225.163.191 58.242.82.5 87.228.190.114
185.222.209.66 71.201.250.104 71.80.64.64 68.183.230.161
187.191.56.195 208.110.93.78 192.47.151.65 37.57.101.119
58.71.52.98 197.54.240.154 185.229.243.244 117.74.120.188