Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Egypt

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.107.216.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43014
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.107.216.229.			IN	A

;; AUTHORITY SECTION:
.			480	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023030200 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 02 13:56:52 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 229.216.107.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 229.216.107.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.39.99.184 attackspambots
Aug 30 10:53:20 pkdns2 sshd\[52313\]: Invalid user ftptest from 54.39.99.184Aug 30 10:53:23 pkdns2 sshd\[52313\]: Failed password for invalid user ftptest from 54.39.99.184 port 55228 ssh2Aug 30 10:57:28 pkdns2 sshd\[52504\]: Invalid user ltsp from 54.39.99.184Aug 30 10:57:30 pkdns2 sshd\[52504\]: Failed password for invalid user ltsp from 54.39.99.184 port 37354 ssh2Aug 30 11:01:41 pkdns2 sshd\[52690\]: Invalid user jking from 54.39.99.184Aug 30 11:01:43 pkdns2 sshd\[52690\]: Failed password for invalid user jking from 54.39.99.184 port 19484 ssh2
...
2019-08-30 16:58:14
107.170.249.6 attackspam
Aug 29 22:18:20 hcbb sshd\[7045\]: Invalid user icinga from 107.170.249.6
Aug 29 22:18:20 hcbb sshd\[7045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.249.6
Aug 29 22:18:21 hcbb sshd\[7045\]: Failed password for invalid user icinga from 107.170.249.6 port 35475 ssh2
Aug 29 22:24:19 hcbb sshd\[7528\]: Invalid user shoutcast from 107.170.249.6
Aug 29 22:24:19 hcbb sshd\[7528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.249.6
2019-08-30 16:28:05
113.143.159.43 attackspam
IP reached maximum auth failures
2019-08-30 16:27:32
142.93.81.77 attackbotsspam
Aug 30 18:16:25 [hidden] sshd[4974]: refused connect from 142.93.81.77 (142.93.81.77)
Aug 30 18:21:06 [hidden] sshd[5095]: refused connect from 142.93.81.77 (142.93.81.77)
Aug 30 18:26:37 [hidden] sshd[5229]: refused connect from 142.93.81.77 (142.93.81.77)
2019-08-30 17:10:53
202.129.29.135 attackspambots
Aug 29 22:30:03 friendsofhawaii sshd\[8704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.29.135  user=root
Aug 29 22:30:05 friendsofhawaii sshd\[8704\]: Failed password for root from 202.129.29.135 port 42833 ssh2
Aug 29 22:35:08 friendsofhawaii sshd\[9114\]: Invalid user sftp from 202.129.29.135
Aug 29 22:35:08 friendsofhawaii sshd\[9114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.29.135
Aug 29 22:35:10 friendsofhawaii sshd\[9114\]: Failed password for invalid user sftp from 202.129.29.135 port 36500 ssh2
2019-08-30 16:46:41
68.183.230.224 attackbotsspam
Aug 30 04:17:20 TORMINT sshd\[22563\]: Invalid user osvi from 68.183.230.224
Aug 30 04:17:20 TORMINT sshd\[22563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.230.224
Aug 30 04:17:22 TORMINT sshd\[22563\]: Failed password for invalid user osvi from 68.183.230.224 port 51346 ssh2
...
2019-08-30 16:40:22
49.247.207.56 attackbots
Aug 30 10:01:12 root sshd[5422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.207.56 
Aug 30 10:01:14 root sshd[5422]: Failed password for invalid user minecraft from 49.247.207.56 port 52526 ssh2
Aug 30 10:05:43 root sshd[5486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.207.56 
...
2019-08-30 16:24:02
146.185.183.107 attack
WordPress wp-login brute force :: 146.185.183.107 0.160 BYPASS [30/Aug/2019:15:45:52  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-30 17:09:33
89.46.105.157 attackbotsspam
\[Fri Aug 30 07:46:03.481752 2019\] \[access_compat:error\] \[pid 5311:tid 140516683372288\] \[client 89.46.105.157:44240\] AH01797: client denied by server configuration: /var/www/lug/xmlrpc.php
...
2019-08-30 16:59:48
82.64.140.9 attack
Aug 29 19:46:03 hcbb sshd\[25815\]: Invalid user pi from 82.64.140.9
Aug 29 19:46:03 hcbb sshd\[25816\]: Invalid user pi from 82.64.140.9
Aug 29 19:46:03 hcbb sshd\[25815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82-64-140-9.subs.proxad.net
Aug 29 19:46:03 hcbb sshd\[25816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82-64-140-9.subs.proxad.net
Aug 29 19:46:04 hcbb sshd\[25815\]: Failed password for invalid user pi from 82.64.140.9 port 43644 ssh2
2019-08-30 17:00:14
77.247.108.204 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-30 16:56:26
104.248.114.58 attackbotsspam
Aug 30 15:12:42 webhost01 sshd[20879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.114.58
Aug 30 15:12:44 webhost01 sshd[20879]: Failed password for invalid user anthony from 104.248.114.58 port 34038 ssh2
...
2019-08-30 16:45:33
159.65.46.224 attackspambots
Aug 30 04:19:53 vps200512 sshd\[18801\]: Invalid user bayonne from 159.65.46.224
Aug 30 04:19:53 vps200512 sshd\[18801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.46.224
Aug 30 04:19:56 vps200512 sshd\[18801\]: Failed password for invalid user bayonne from 159.65.46.224 port 55502 ssh2
Aug 30 04:23:51 vps200512 sshd\[18918\]: Invalid user sra from 159.65.46.224
Aug 30 04:23:51 vps200512 sshd\[18918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.46.224
2019-08-30 16:31:09
198.12.152.118 attackbots
WordPress wp-login brute force :: 198.12.152.118 0.132 BYPASS [30/Aug/2019:17:39:06  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-30 17:03:52
36.70.50.20 attackbotsspam
Aug 30 07:37:04 iago sshd[20990]: Did not receive identification string from 36.70.50.20
Aug 30 07:37:19 iago sshd[20991]: Invalid user avanthi from 36.70.50.20
Aug 30 07:37:21 iago sshd[20991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.70.50.20 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=36.70.50.20
2019-08-30 17:01:59

Recently Reported IPs

192.229.221.95 206.8.50.229 10.80.105.102 82.39.143.66
160.39.129.24 31.129.158.79 223.60.194.130 53.214.70.82
182.239.115.79 111.166.81.240 126.77.49.111 172.217.44.201
45.15.177.249 157.230.79.100 91.218.252.187 86.225.129.143
43.152.65.163 133.218.253.215 1.20.73.192 180.193.221.183