Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.69.210.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11515
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.69.210.164.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 16:06:19 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 164.210.69.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.210.69.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.234.131.141 attack
Invalid user oow from 62.234.131.141 port 55048
2020-01-10 22:43:38
115.249.205.29 attack
Invalid user tommy from 115.249.205.29 port 43499
2020-01-10 22:37:00
185.126.202.198 attackspam
Unauthorized SSH login attempts
2020-01-10 22:27:27
64.32.68.74 attack
2020-01-10T08:50:17.8077201495-001 sshd[34669]: Invalid user guest from 64.32.68.74 port 52902
2020-01-10T08:50:17.8110901495-001 sshd[34669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ipsantodomingo-074-drst.codetel.net.do
2020-01-10T08:50:17.8077201495-001 sshd[34669]: Invalid user guest from 64.32.68.74 port 52902
2020-01-10T08:50:20.1136671495-001 sshd[34669]: Failed password for invalid user guest from 64.32.68.74 port 52902 ssh2
2020-01-10T08:53:45.5305581495-001 sshd[34867]: Invalid user ifconfig from 64.32.68.74 port 51913
2020-01-10T08:53:45.5338521495-001 sshd[34867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ipsantodomingo-074-drst.codetel.net.do
2020-01-10T08:53:45.5305581495-001 sshd[34867]: Invalid user ifconfig from 64.32.68.74 port 51913
2020-01-10T08:53:48.0566521495-001 sshd[34867]: Failed password for invalid user ifconfig from 64.32.68.74 port 51913 ssh2
2020-01-10T08:57:14.2
...
2020-01-10 22:17:55
156.221.116.240 attackspambots
Invalid user admin from 156.221.116.240 port 33039
2020-01-10 22:29:16
94.182.191.45 attack
Jan  6 17:26:28 myhostname sshd[16685]: Invalid user jira1 from 94.182.191.45
Jan  6 17:26:28 myhostname sshd[16685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.182.191.45
Jan  6 17:26:30 myhostname sshd[16685]: Failed password for invalid user jira1 from 94.182.191.45 port 46020 ssh2
Jan  6 17:26:30 myhostname sshd[16685]: Received disconnect from 94.182.191.45 port 46020:11: Bye Bye [preauth]
Jan  6 17:26:30 myhostname sshd[16685]: Disconnected from 94.182.191.45 port 46020 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.182.191.45
2020-01-10 22:41:21
212.183.227.162 attackbotsspam
Invalid user office from 212.183.227.162 port 36526
2020-01-10 22:20:49
156.213.95.216 attackbotsspam
Invalid user admin from 156.213.95.216 port 49888
2020-01-10 22:29:42
51.254.136.164 attack
Invalid user www from 51.254.136.164 port 55934
2020-01-10 22:45:33
49.232.162.53 attackspambots
Invalid user jana from 49.232.162.53 port 50756
2020-01-10 22:46:43
51.83.41.120 attackspambots
Invalid user bnm from 51.83.41.120 port 57938
2020-01-10 22:18:13
95.167.225.85 attack
Invalid user print2000 from 95.167.225.85 port 38434
2020-01-10 22:17:10
201.149.20.162 attackspam
Invalid user user from 201.149.20.162 port 32864
2020-01-10 22:24:13
119.161.156.11 attack
Invalid user gmp from 119.161.156.11 port 45278
2020-01-10 22:34:44
119.194.23.211 attackbots
unauthorized connection attempt
2020-01-10 22:34:30

Recently Reported IPs

9.121.252.203 129.157.41.239 212.83.171.22 218.185.16.121
26.65.81.35 83.12.175.171 174.187.10.1 187.174.3.255
49.145.221.211 75.37.28.144 250.159.196.24 236.81.18.57
187.163.106.221 176.150.89.76 243.237.86.73 80.120.236.239
152.210.10.186 8.130.75.192 127.5.191.120 165.63.219.48