Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.117.163.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14157
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.117.163.55.			IN	A

;; AUTHORITY SECTION:
.			226	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 09:39:20 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 55.163.117.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.163.117.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.4.28.247 attackbots
Oct  7 07:39:04 OPSO sshd\[3622\]: Invalid user Whiskey@2017 from 62.4.28.247 port 48186
Oct  7 07:39:04 OPSO sshd\[3622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.28.247
Oct  7 07:39:06 OPSO sshd\[3622\]: Failed password for invalid user Whiskey@2017 from 62.4.28.247 port 48186 ssh2
Oct  7 07:43:16 OPSO sshd\[4349\]: Invalid user 123Action from 62.4.28.247 port 48768
Oct  7 07:43:16 OPSO sshd\[4349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.28.247
2019-10-07 16:34:08
92.79.179.89 attackbots
Oct  7 02:57:49 vtv3 sshd\[8279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.79.179.89  user=root
Oct  7 02:57:50 vtv3 sshd\[8279\]: Failed password for root from 92.79.179.89 port 32312 ssh2
Oct  7 03:03:52 vtv3 sshd\[11204\]: Invalid user 123 from 92.79.179.89 port 40786
Oct  7 03:03:52 vtv3 sshd\[11204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.79.179.89
Oct  7 03:03:53 vtv3 sshd\[11204\]: Failed password for invalid user 123 from 92.79.179.89 port 40786 ssh2
Oct  7 03:15:44 vtv3 sshd\[17207\]: Invalid user Qwerty2017 from 92.79.179.89 port 23514
Oct  7 03:15:44 vtv3 sshd\[17207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.79.179.89
Oct  7 03:15:46 vtv3 sshd\[17207\]: Failed password for invalid user Qwerty2017 from 92.79.179.89 port 23514 ssh2
Oct  7 03:21:33 vtv3 sshd\[19990\]: Invalid user Agency2017 from 92.79.179.89 port 20382
Oct  7 03:21:33 vtv
2019-10-07 16:32:42
36.250.94.162 attackbotsspam
Lines containing failures of 36.250.94.162 (max 1000)
Oct  7 07:20:54 localhost sshd[11559]: User r.r from 36.250.94.162 not allowed because listed in DenyUsers
Oct  7 07:20:54 localhost sshd[11559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.250.94.162  user=r.r
Oct  7 07:20:56 localhost sshd[11559]: Failed password for invalid user r.r from 36.250.94.162 port 47580 ssh2
Oct  7 07:20:58 localhost sshd[11559]: Received disconnect from 36.250.94.162 port 47580:11: Bye Bye [preauth]
Oct  7 07:20:58 localhost sshd[11559]: Disconnected from invalid user r.r 36.250.94.162 port 47580 [preauth]
Oct  7 07:40:55 localhost sshd[22507]: User r.r from 36.250.94.162 not allowed because listed in DenyUsers
Oct  7 07:40:55 localhost sshd[22507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.250.94.162  user=r.r
Oct  7 07:40:56 localhost sshd[22507]: Failed password for invalid user r.r from 36.........
------------------------------
2019-10-07 16:39:10
176.223.122.141 attackspambots
ssh brute force
2019-10-07 16:42:38
123.207.140.248 attackbots
Oct  7 10:01:46 vmanager6029 sshd\[12705\]: Invalid user Spain@123 from 123.207.140.248 port 40293
Oct  7 10:01:46 vmanager6029 sshd\[12705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.140.248
Oct  7 10:01:48 vmanager6029 sshd\[12705\]: Failed password for invalid user Spain@123 from 123.207.140.248 port 40293 ssh2
2019-10-07 16:33:47
162.247.74.206 attack
Oct  7 04:04:41 thevastnessof sshd[5581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.206
...
2019-10-07 16:48:00
156.236.73.50 attackspambots
Oct 07 02:35:53 askasleikir sshd[232670]: Failed password for root from 156.236.73.50 port 33274 ssh2
Oct 07 02:42:18 askasleikir sshd[232831]: Failed password for root from 156.236.73.50 port 33503 ssh2
2019-10-07 16:53:23
94.68.229.72 attackspambots
Automatic report - Port Scan Attack
2019-10-07 16:31:36
165.227.115.93 attackspam
Oct  6 22:41:17 php1 sshd\[30730\]: Invalid user 123 from 165.227.115.93
Oct  6 22:41:17 php1 sshd\[30730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.115.93
Oct  6 22:41:20 php1 sshd\[30730\]: Failed password for invalid user 123 from 165.227.115.93 port 57058 ssh2
Oct  6 22:45:22 php1 sshd\[31179\]: Invalid user p@\$\$w0rd123 from 165.227.115.93
Oct  6 22:45:22 php1 sshd\[31179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.115.93
2019-10-07 16:55:40
190.64.141.18 attack
2019-10-07T07:25:54.789464shield sshd\[18245\]: Invalid user Passw0rt123 from 190.64.141.18 port 37767
2019-10-07T07:25:54.794697shield sshd\[18245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=r190-64-141-18.ir-static.anteldata.net.uy
2019-10-07T07:25:57.127083shield sshd\[18245\]: Failed password for invalid user Passw0rt123 from 190.64.141.18 port 37767 ssh2
2019-10-07T07:30:57.365637shield sshd\[18758\]: Invalid user P4rol4@2016 from 190.64.141.18 port 57692
2019-10-07T07:30:57.370221shield sshd\[18758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=r190-64-141-18.ir-static.anteldata.net.uy
2019-10-07 17:06:44
190.147.159.34 attackspam
ssh brute force
2019-10-07 17:06:01
218.255.6.106 attackbotsspam
(sshd) Failed SSH login from 218.255.6.106 (HK/Hong Kong/static.reserve.wtt.net.hk): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Oct  6 23:46:59 host sshd[46610]: Did not receive identification string from 218.255.6.106 port 4814
2019-10-07 17:02:49
218.92.0.205 attackbotsspam
2019-10-07T08:56:29.711163abusebot-4.cloudsearch.cf sshd\[16896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.205  user=root
2019-10-07 16:58:46
134.209.12.162 attackspambots
Oct  7 10:13:51 [host] sshd[26694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.12.162  user=root
Oct  7 10:13:53 [host] sshd[26694]: Failed password for root from 134.209.12.162 port 41104 ssh2
Oct  7 10:17:50 [host] sshd[26800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.12.162  user=root
2019-10-07 16:35:04
115.159.149.136 attackspam
Oct  7 09:03:46 jane sshd[21222]: Failed password for root from 115.159.149.136 port 55812 ssh2
...
2019-10-07 16:57:32

Recently Reported IPs

41.139.236.181 177.72.88.78 39.41.138.226 200.77.198.255
179.6.73.66 5.43.220.251 182.124.117.41 181.230.234.119
114.7.112.50 151.28.123.160 197.1.27.15 183.82.108.217
113.128.25.45 187.167.191.241 182.85.162.219 2.187.169.177
134.236.105.97 88.118.51.255 45.80.106.179 111.25.45.13