Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.90.145.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57774
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;168.90.145.216.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021201 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 05:39:16 CST 2025
;; MSG SIZE  rcvd: 107
Host info
216.145.90.168.in-addr.arpa domain name pointer 168-90-145-216.jrnetdns.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
216.145.90.168.in-addr.arpa	name = 168-90-145-216.jrnetdns.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.134.179.57 attackspambots
Mar 19 02:24:27 debian-2gb-nbg1-2 kernel: \[6840175.826262\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.134.179.57 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=50516 PROTO=TCP SPT=56898 DPT=8002 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-19 09:30:51
175.11.71.221 attackbotsspam
Email rejected due to spam filtering
2020-03-19 09:18:43
119.29.10.25 attackspam
Ssh brute force
2020-03-19 09:09:35
129.28.78.8 attack
Mar 19 00:20:42 mout sshd[25048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.78.8  user=root
Mar 19 00:20:45 mout sshd[25048]: Failed password for root from 129.28.78.8 port 60782 ssh2
2020-03-19 09:41:09
128.199.155.218 attackbots
invalid login attempt (louis)
2020-03-19 09:28:13
158.69.223.91 attackspambots
SSH Brute-Forcing (server1)
2020-03-19 09:37:16
89.163.131.51 attackspam
Scanned 3 times in the last 24 hours on port 22
2020-03-19 09:35:53
66.70.178.54 attackbots
Invalid user daniel from 66.70.178.54 port 38110
2020-03-19 09:17:34
36.90.40.131 attackbotsspam
1584569572 - 03/18/2020 23:12:52 Host: 36.90.40.131/36.90.40.131 Port: 445 TCP Blocked
2020-03-19 09:22:27
87.251.74.9 attackbotsspam
03/18/2020-20:05:59.152405 87.251.74.9 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-19 09:05:15
41.46.86.89 attack
1584569586 - 03/18/2020 23:13:06 Host: 41.46.86.89/41.46.86.89 Port: 445 TCP Blocked
2020-03-19 09:10:30
122.166.237.117 attack
5x Failed Password
2020-03-19 09:02:03
181.30.28.201 attackspam
Mar 18 23:44:25 haigwepa sshd[31802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.28.201 
Mar 18 23:44:27 haigwepa sshd[31802]: Failed password for invalid user astec from 181.30.28.201 port 48514 ssh2
...
2020-03-19 09:16:06
114.204.218.154 attackbotsspam
Mar 18 23:09:38 santamaria sshd\[27148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.204.218.154  user=root
Mar 18 23:09:40 santamaria sshd\[27148\]: Failed password for root from 114.204.218.154 port 39976 ssh2
Mar 18 23:12:52 santamaria sshd\[27193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.204.218.154  user=root
...
2020-03-19 09:21:05
96.84.240.89 attackspam
SSH bruteforce (Triggered fail2ban)
2020-03-19 09:42:12

Recently Reported IPs

123.33.118.121 115.147.224.139 76.40.101.241 89.232.18.188
78.18.60.113 217.65.73.53 160.241.0.63 47.169.8.184
212.80.31.2 182.210.147.179 172.161.207.5 182.140.232.56
34.57.72.223 66.122.1.193 209.108.131.8 220.145.157.15
34.2.83.174 190.40.222.107 50.199.60.83 75.124.58.152