Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.45.159.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4568
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.45.159.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011900 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 19 22:13:02 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 1.159.45.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.159.45.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
197.230.101.34 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 02:25:07,878 INFO [shellcode_manager] (197.230.101.34) no match, writing hexdump (c5c992fb33d5615bdc5e0cb9a7aefcce :2307670) - MS17010 (EternalBlue)
2019-07-03 16:32:12
92.14.249.4 attack
firewall-block, port(s): 23/tcp
2019-07-03 16:23:22
110.244.153.118 attackspam
23/tcp
[2019-07-03]1pkt
2019-07-03 17:10:05
138.197.221.114 attackbotsspam
Jul  3 07:26:30 ns37 sshd[17841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.221.114
2019-07-03 16:51:31
94.103.94.53 attack
Scanning random ports - tries to find possible vulnerable services
2019-07-03 16:34:03
221.232.179.39 attackbotsspam
23/tcp
[2019-07-03]1pkt
2019-07-03 17:05:08
107.170.249.90 attackbots
5351/udp 21753/tcp 32228/tcp...
[2019-05-02/07-03]53pkt,47pt.(tcp),3pt.(udp)
2019-07-03 16:30:57
107.170.238.150 attackspambots
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-03 16:32:35
14.161.24.1 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 04:48:04,221 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.161.24.1)
2019-07-03 16:52:06
81.22.45.9 attack
Jul  3 07:07:44   TCP Attack: SRC=81.22.45.9 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=240  PROTO=TCP SPT=44002 DPT=3910 WINDOW=1024 RES=0x00 SYN URGP=0
2019-07-03 16:25:29
35.198.139.43 attackspambots
Jul  3 03:45:17 aat-srv002 sshd[4276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.198.139.43
Jul  3 03:45:19 aat-srv002 sshd[4276]: Failed password for invalid user papernet from 35.198.139.43 port 49002 ssh2
Jul  3 03:47:38 aat-srv002 sshd[4327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.198.139.43
Jul  3 03:47:40 aat-srv002 sshd[4327]: Failed password for invalid user ethos from 35.198.139.43 port 46436 ssh2
...
2019-07-03 16:48:45
219.92.25.164 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-07-03 16:55:16
77.127.92.193 attack
23/tcp
[2019-07-03]1pkt
2019-07-03 16:59:32
114.104.158.172 attackbots
Unauthorized connection attempt from IP address 114.104.158.172
2019-07-03 17:03:27
14.226.32.83 attack
445/tcp
[2019-07-03]1pkt
2019-07-03 16:38:42

Recently Reported IPs

9.100.244.208 46.203.159.150 176.109.90.201 155.133.250.4
27.106.128.88 15.235.229.23 237.125.173.141 112.193.34.3
104.236.57.206 136.191.5.208 183.56.238.6 245.160.98.165
195.3.106.25 101.67.49.60 211.23.99.221 172.4.8.153
32.39.31.132 216.55.49.219 138.199.43.151 245.165.245.134