Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ethiopia

Internet Service Provider: unknown

Hostname: unknown

Organization: Ethiopian Telecommunication Corporation

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
196.189.45.32 attackspam
Unauthorized connection attempt from IP address 196.189.45.32 on Port 445(SMB)
2020-04-01 07:03:45
196.189.45.33 attack
Unauthorized connection attempt from IP address 196.189.45.33 on Port 445(SMB)
2020-02-26 09:54:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.189.45.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29501
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.189.45.169.			IN	A

;; AUTHORITY SECTION:
.			569	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072300 1800 900 604800 86400

;; Query time: 719 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jul 23 23:46:05 CST 2019
;; MSG SIZE  rcvd: 118
Host info
169.45.189.196.in-addr.arpa has no PTR record
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 169.45.189.196.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
49.234.108.192 attackbots
Port 42176 scan denied
2020-02-08 20:53:07
171.11.109.57 attackbots
firewall-block, port(s): 445/tcp
2020-02-08 21:01:11
84.5.157.3 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-02-08 21:05:42
49.236.212.62 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/49.236.212.62/ 
 
 NP - 1H : (2)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : NP 
 NAME ASN : ASN55915 
 
 IP : 49.236.212.62 
 
 CIDR : 49.236.212.0/24 
 
 PREFIX COUNT : 25 
 
 UNIQUE IP COUNT : 7424 
 
 
 ATTACKS DETECTED ASN55915 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2020-02-08 05:49:21 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-02-08 20:47:30
49.235.90.120 attackspambots
2020-02-08T04:44:51.635536abusebot-8.cloudsearch.cf sshd[10961]: Invalid user hpy from 49.235.90.120 port 57426
2020-02-08T04:44:51.642553abusebot-8.cloudsearch.cf sshd[10961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.90.120
2020-02-08T04:44:51.635536abusebot-8.cloudsearch.cf sshd[10961]: Invalid user hpy from 49.235.90.120 port 57426
2020-02-08T04:44:53.758380abusebot-8.cloudsearch.cf sshd[10961]: Failed password for invalid user hpy from 49.235.90.120 port 57426 ssh2
2020-02-08T04:49:18.066152abusebot-8.cloudsearch.cf sshd[11262]: Invalid user oll from 49.235.90.120 port 56506
2020-02-08T04:49:18.073405abusebot-8.cloudsearch.cf sshd[11262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.90.120
2020-02-08T04:49:18.066152abusebot-8.cloudsearch.cf sshd[11262]: Invalid user oll from 49.235.90.120 port 56506
2020-02-08T04:49:20.510347abusebot-8.cloudsearch.cf sshd[11262]: Failed password 
...
2020-02-08 20:49:40
89.210.84.51 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2020-02-08 21:01:28
60.8.216.98 attack
02/08/2020-05:49:09.662431 60.8.216.98 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-08 20:58:14
92.51.90.238 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-08 21:00:36
59.91.193.242 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-08 21:12:42
197.61.159.165 attack
Telnet/23 MH Probe, BF, Hack -
2020-02-08 21:19:26
13.79.245.192 attackspam
Lines containing failures of 13.79.245.192
Feb  5 02:26:59 HOSTNAME sshd[29980]: User r.r from 13.79.245.192 not allowed because not listed in AllowUsers
Feb  5 02:26:59 HOSTNAME sshd[29980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.79.245.192  user=r.r
Feb  5 02:27:01 HOSTNAME sshd[29980]: Failed password for invalid user r.r from 13.79.245.192 port 60348 ssh2
Feb  5 02:27:01 HOSTNAME sshd[29980]: Received disconnect from 13.79.245.192 port 60348:11: Bye Bye [preauth]
Feb  5 02:27:01 HOSTNAME sshd[29980]: Disconnected from 13.79.245.192 port 60348 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=13.79.245.192
2020-02-08 21:00:53
46.162.105.246 attackspam
Honeypot attack, port: 5555, PTR: 46-162-105-246.cust.bredband2.com.
2020-02-08 20:38:21
222.127.171.66 attackbotsspam
Brute-force attempt banned
2020-02-08 20:36:16
187.170.229.208 attackspam
Automatic report - Port Scan Attack
2020-02-08 20:56:17
103.52.217.17 attack
Honeypot attack, port: 389, PTR: PTR record not found
2020-02-08 20:37:23

Recently Reported IPs

2600:1005:b14c:71e1:1dea:1f9e:3efa:5cdb 122.204.222.76 27.5.219.1 30.213.58.217
59.63.149.241 77.92.124.170 106.52.155.37 210.188.22.223
58.222.233.124 49.172.188.50 38.97.42.98 212.29.201.116
17.186.124.114 114.93.165.37 5.56.176.54 49.204.154.226
1.47.172.205 2003:f5:f3d8:92c8:f093:a85e:f163:3a11 95.157.20.146 134.73.76.208