Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.45.166.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50026
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.45.166.116.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 16:32:27 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 116.166.45.212.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 116.166.45.212.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
163.44.158.105 attack
Jan  7 00:03:10 meumeu sshd[22878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.158.105 
Jan  7 00:03:12 meumeu sshd[22878]: Failed password for invalid user sagemath from 163.44.158.105 port 38820 ssh2
Jan  7 00:04:25 meumeu sshd[23036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.158.105 
...
2020-01-07 07:13:15
157.230.128.181 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.128.181
Failed password for invalid user jira from 157.230.128.181 port 46954 ssh2
Invalid user zjv from 157.230.128.181 port 41750
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.128.181
Failed password for invalid user zjv from 157.230.128.181 port 41750 ssh2
2020-01-07 06:55:44
54.39.145.123 attackbotsspam
Unauthorized connection attempt detected from IP address 54.39.145.123 to port 2220 [J]
2020-01-07 06:42:34
182.18.188.132 attackbotsspam
Unauthorized connection attempt detected from IP address 182.18.188.132 to port 2220 [J]
2020-01-07 06:41:28
106.12.18.225 attackspambots
Unauthorized connection attempt detected from IP address 106.12.18.225 to port 2220 [J]
2020-01-07 07:11:04
123.138.18.11 attack
Unauthorized connection attempt detected from IP address 123.138.18.11 to port 2220 [J]
2020-01-07 07:11:20
151.80.46.40 attackspam
Unauthorized connection attempt detected from IP address 151.80.46.40 to port 2220 [J]
2020-01-07 06:44:15
165.22.186.18 attackbots
165.22.186.18 - - [06/Jan/2020:21:50:20 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.186.18 - - [06/Jan/2020:21:50:21 +0100] "POST /wp-login.php HTTP/1.1" 200 2298 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.186.18 - - [06/Jan/2020:21:50:21 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.186.18 - - [06/Jan/2020:21:50:21 +0100] "POST /wp-login.php HTTP/1.1" 200 2272 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.186.18 - - [06/Jan/2020:21:50:27 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.186.18 - - [06/Jan/2020:21:50:27 +0100] "POST /wp-login.php HTTP/1.1" 200 2273 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-01-07 07:12:45
156.67.250.205 attackspambots
2020-01-06T17:31:40.6493031495-001 sshd[39339]: Invalid user administrativo from 156.67.250.205 port 44280
2020-01-06T17:31:40.6579721495-001 sshd[39339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.67.250.205
2020-01-06T17:31:40.6493031495-001 sshd[39339]: Invalid user administrativo from 156.67.250.205 port 44280
2020-01-06T17:31:42.6589441495-001 sshd[39339]: Failed password for invalid user administrativo from 156.67.250.205 port 44280 ssh2
2020-01-06T17:35:08.1127301495-001 sshd[39433]: Invalid user dggim from 156.67.250.205 port 45056
2020-01-06T17:35:08.1160701495-001 sshd[39433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.67.250.205
2020-01-06T17:35:08.1127301495-001 sshd[39433]: Invalid user dggim from 156.67.250.205 port 45056
2020-01-06T17:35:10.0062081495-001 sshd[39433]: Failed password for invalid user dggim from 156.67.250.205 port 45056 ssh2
2020-01-06T17:38:33.4317451495-00
...
2020-01-07 07:03:53
109.86.254.78 attackspambots
Unauthorized connection attempt detected from IP address 109.86.254.78 to port 2220 [J]
2020-01-07 06:53:06
149.56.101.239 attackbotsspam
149.56.101.239 - - \[06/Jan/2020:21:51:08 +0100\] "POST /wp-login.php HTTP/1.0" 200 6699 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
149.56.101.239 - - \[06/Jan/2020:21:51:10 +0100\] "POST /wp-login.php HTTP/1.0" 200 6499 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
149.56.101.239 - - \[06/Jan/2020:21:51:11 +0100\] "POST /wp-login.php HTTP/1.0" 200 6515 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-07 06:50:38
117.0.125.3 attackspambots
1578343824 - 01/06/2020 21:50:24 Host: 117.0.125.3/117.0.125.3 Port: 445 TCP Blocked
2020-01-07 07:16:38
197.248.16.118 attack
Unauthorized connection attempt detected from IP address 197.248.16.118 to port 2220 [J]
2020-01-07 07:01:11
112.21.191.54 attackbots
Unauthorized connection attempt detected from IP address 112.21.191.54 to port 2220 [J]
2020-01-07 07:10:41
216.10.249.73 attackspambots
Jan  6 20:51:04 ws25vmsma01 sshd[50450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.10.249.73
Jan  6 20:51:07 ws25vmsma01 sshd[50450]: Failed password for invalid user zach from 216.10.249.73 port 47104 ssh2
...
2020-01-07 06:53:34

Recently Reported IPs

131.170.142.161 53.146.10.33 219.231.17.253 142.191.169.173
169.222.64.33 101.125.45.10 43.120.245.26 131.56.70.194
121.157.70.85 146.58.203.131 114.223.74.89 251.85.148.122
175.113.225.244 176.252.221.137 252.80.62.77 207.242.168.100
127.79.72.187 39.168.136.179 30.128.61.168 4.166.206.196