Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lagos

Region: Lagos

Country: Nigeria

Internet Service Provider: unknown

Hostname: unknown

Organization: UNILAG

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.45.52.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11881
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.45.52.162.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060901 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 10 04:53:17 CST 2019
;; MSG SIZE  rcvd: 117

Host info
Host 162.52.45.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 162.52.45.196.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
183.62.139.167 attackspambots
Aug 23 03:52:02 onepixel sshd[2982440]: Failed password for root from 183.62.139.167 port 33122 ssh2
Aug 23 03:55:21 onepixel sshd[2982985]: Invalid user julie from 183.62.139.167 port 52870
Aug 23 03:55:21 onepixel sshd[2982985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.62.139.167 
Aug 23 03:55:21 onepixel sshd[2982985]: Invalid user julie from 183.62.139.167 port 52870
Aug 23 03:55:23 onepixel sshd[2982985]: Failed password for invalid user julie from 183.62.139.167 port 52870 ssh2
2020-08-23 12:27:57
167.99.96.114 attack
$f2bV_matches
2020-08-23 12:36:56
120.53.103.84 attack
SSH invalid-user multiple login try
2020-08-23 12:51:35
106.13.185.47 attackspam
Aug 23 06:22:42 vps647732 sshd[3333]: Failed password for root from 106.13.185.47 port 38572 ssh2
...
2020-08-23 12:42:22
51.68.190.223 attackbots
2020-08-23T07:25:18.281020mail.standpoint.com.ua sshd[14072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.ip-51-68-190.eu
2020-08-23T07:25:18.277937mail.standpoint.com.ua sshd[14072]: Invalid user user from 51.68.190.223 port 40284
2020-08-23T07:25:20.121438mail.standpoint.com.ua sshd[14072]: Failed password for invalid user user from 51.68.190.223 port 40284 ssh2
2020-08-23T07:28:56.900098mail.standpoint.com.ua sshd[14743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.ip-51-68-190.eu  user=root
2020-08-23T07:28:59.001576mail.standpoint.com.ua sshd[14743]: Failed password for root from 51.68.190.223 port 42856 ssh2
...
2020-08-23 12:48:38
180.76.105.81 attack
Aug 23 05:54:57 marvibiene sshd[12179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.105.81 
Aug 23 05:54:59 marvibiene sshd[12179]: Failed password for invalid user konrad from 180.76.105.81 port 48000 ssh2
2020-08-23 12:52:31
64.227.15.121 attackbotsspam
Aug 23 00:25:45 ny01 sshd[951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.15.121
Aug 23 00:25:47 ny01 sshd[951]: Failed password for invalid user user from 64.227.15.121 port 40100 ssh2
Aug 23 00:30:43 ny01 sshd[1711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.15.121
2020-08-23 12:33:00
216.218.206.116 attack
srv02 Mass scanning activity detected Target: 5683  ..
2020-08-23 12:44:48
46.101.40.21 attack
Aug 23 06:46:23 fhem-rasp sshd[13911]: Invalid user julie from 46.101.40.21 port 56098
...
2020-08-23 12:58:53
185.116.161.125 attackbots
Port Scan detected!
...
2020-08-23 12:38:16
45.95.168.172 attackspam
Aug 22 20:55:21 dignus sshd[6125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.168.172
Aug 22 20:55:23 dignus sshd[6125]: Failed password for invalid user user from 45.95.168.172 port 45190 ssh2
Aug 22 20:55:33 dignus sshd[6172]: Invalid user ubnt from 45.95.168.172 port 41506
Aug 22 20:55:33 dignus sshd[6172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.168.172
Aug 22 20:55:35 dignus sshd[6172]: Failed password for invalid user ubnt from 45.95.168.172 port 41506 ssh2
...
2020-08-23 12:20:12
49.233.197.173 attackbots
failed root login
2020-08-23 12:41:07
206.189.145.251 attack
Aug 23 04:24:33 rush sshd[9195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.145.251
Aug 23 04:24:35 rush sshd[9195]: Failed password for invalid user admin from 206.189.145.251 port 36472 ssh2
Aug 23 04:28:53 rush sshd[9276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.145.251
...
2020-08-23 12:30:42
141.98.9.161 attackbots
2020-08-23T04:01:00.887885dmca.cloudsearch.cf sshd[20630]: Invalid user admin from 141.98.9.161 port 40323
2020-08-23T04:01:00.896128dmca.cloudsearch.cf sshd[20630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161
2020-08-23T04:01:00.887885dmca.cloudsearch.cf sshd[20630]: Invalid user admin from 141.98.9.161 port 40323
2020-08-23T04:01:02.883229dmca.cloudsearch.cf sshd[20630]: Failed password for invalid user admin from 141.98.9.161 port 40323 ssh2
2020-08-23T04:01:23.377379dmca.cloudsearch.cf sshd[20715]: Invalid user ubnt from 141.98.9.161 port 42311
2020-08-23T04:01:23.383250dmca.cloudsearch.cf sshd[20715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161
2020-08-23T04:01:23.377379dmca.cloudsearch.cf sshd[20715]: Invalid user ubnt from 141.98.9.161 port 42311
2020-08-23T04:01:25.194544dmca.cloudsearch.cf sshd[20715]: Failed password for invalid user ubnt from 141.98.9.161 port 42
...
2020-08-23 12:21:04
190.207.103.32 attack
Port probing on unauthorized port 23
2020-08-23 12:52:02

Recently Reported IPs

108.21.46.232 74.63.226.142 67.161.47.39 95.10.83.248
91.200.221.52 183.157.169.237 206.171.110.81 62.203.27.27
204.241.42.92 218.80.245.54 71.14.174.200 160.28.126.251
103.139.12.112 46.101.37.60 58.101.105.133 185.126.23.50
84.69.242.248 151.177.130.210 151.130.54.132 194.58.71.58