Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stockholm

Region: Stockholms

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 23.45.243.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2095
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;23.45.243.164.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 10:59:17 CST 2025
;; MSG SIZE  rcvd: 106
Host info
164.243.45.23.in-addr.arpa domain name pointer a23-45-243-164.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.243.45.23.in-addr.arpa	name = a23-45-243-164.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
91.205.146.52 attackbotsspam
Unauthorized connection attempt from IP address 91.205.146.52 on Port 445(SMB)
2020-07-04 06:06:36
125.19.132.51 attackspam
Unauthorized connection attempt from IP address 125.19.132.51 on Port 445(SMB)
2020-07-04 06:10:51
93.63.234.74 attackspam
[munged]::443 93.63.234.74 - - [03/Jul/2020:22:29:05 +0200] "POST /[munged]: HTTP/1.1" 200 6954 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-04 06:16:29
128.70.57.205 attackbots
VNC brute force attack detected by fail2ban
2020-07-04 05:45:54
128.199.177.224 attackspam
Invalid user svnuser from 128.199.177.224 port 46934
2020-07-04 06:06:00
183.111.96.20 attackbotsspam
SSH Honeypot -> SSH Bruteforce / Login
2020-07-04 06:08:09
50.63.196.206 attack
Wordpress_xmlrpc_attack
2020-07-04 05:56:28
184.154.139.9 attackspambots
ecw-Joomla User : try to access forms...
2020-07-04 05:48:47
141.98.81.207 attackbotsspam
Invalid user admin from 141.98.81.207 port 14617
2020-07-04 06:05:21
138.197.129.38 attack
sshd jail - ssh hack attempt
2020-07-04 05:59:09
36.70.89.170 attackspambots
Unauthorized connection attempt from IP address 36.70.89.170 on Port 445(SMB)
2020-07-04 06:09:04
211.159.149.29 attackspam
Invalid user admin from 211.159.149.29 port 60616
2020-07-04 06:07:29
113.160.151.210 attackbots
Unauthorized connection attempt from IP address 113.160.151.210 on Port 445(SMB)
2020-07-04 06:01:55
122.51.221.184 attackbotsspam
Jul  3 16:06:30 server1 sshd\[32382\]: Invalid user xqf from 122.51.221.184
Jul  3 16:06:30 server1 sshd\[32382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.221.184 
Jul  3 16:06:33 server1 sshd\[32382\]: Failed password for invalid user xqf from 122.51.221.184 port 38352 ssh2
Jul  3 16:10:34 server1 sshd\[1252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.221.184  user=root
Jul  3 16:10:36 server1 sshd\[1252\]: Failed password for root from 122.51.221.184 port 58298 ssh2
...
2020-07-04 06:14:57
218.92.0.215 attackspambots
Jul  3 22:08:35 game-panel sshd[20484]: Failed password for root from 218.92.0.215 port 63483 ssh2
Jul  3 22:08:44 game-panel sshd[20487]: Failed password for root from 218.92.0.215 port 54747 ssh2
2020-07-04 06:11:54

Recently Reported IPs

134.180.106.225 15.141.129.239 46.204.190.102 229.9.58.24
239.190.109.105 212.135.69.129 17.38.47.116 169.137.177.82
212.74.247.28 30.34.161.179 146.254.169.104 34.135.53.167
22.87.30.186 142.232.79.111 48.227.112.27 52.222.77.196
186.171.251.176 241.182.179.117 84.210.85.67 192.210.15.196