Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Salvador

Region: Bahia

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.160.49.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17508
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.160.49.194.			IN	A

;; AUTHORITY SECTION:
.			443	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082501 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Aug 26 08:43:22 CST 2020
;; MSG SIZE  rcvd: 117
Host info
194.49.160.45.in-addr.arpa domain name pointer 194.49.160.45.linktechprovedor.net.br.194.49.160.45.in-addr.arpa.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.49.160.45.in-addr.arpa	name = 194.49.160.45.linktechprovedor.net.br.194.49.160.45.in-addr.arpa.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
103.232.123.120 attack
445/tcp 1433/tcp...
[2019-10-23/12-22]8pkt,2pt.(tcp)
2019-12-24 06:43:28
222.87.37.54 attack
" "
2019-12-24 06:48:06
110.172.130.238 attackspam
1433/tcp 445/tcp...
[2019-10-28/12-22]9pkt,2pt.(tcp)
2019-12-24 06:35:23
120.131.3.144 attackbotsspam
IP blocked
2019-12-24 07:06:05
179.39.13.187 attackbots
Automatic report - Port Scan Attack
2019-12-24 06:50:42
222.186.169.192 attackspambots
Triggered by Fail2Ban at Vostok web server
2019-12-24 06:49:52
139.162.123.29 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 06:33:36
91.74.234.154 attack
Dec 23 22:27:01 localhost sshd[24078]: Invalid user asecondo from 91.74.234.154 port 48872
Dec 23 22:27:02 localhost sshd[24078]: Failed password for invalid user asecondo from 91.74.234.154 port 48872 ssh2
Dec 23 22:28:25 localhost sshd[24113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.74.234.154  user=root
Dec 23 22:28:27 localhost sshd[24113]: Failed password for root from 91.74.234.154 port 33362 ssh2
Dec 23 22:29:55 localhost sshd[24127]: Invalid user jin from 91.74.234.154 port 46086
2019-12-24 06:35:55
79.101.106.74 attack
Automatic report - Banned IP Access
2019-12-24 07:01:40
185.175.93.105 attackbotsspam
12/23/2019-17:49:19.657956 185.175.93.105 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-24 06:51:15
54.39.98.253 attack
Dec 23 16:57:38 MK-Soft-VM5 sshd[26488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.98.253 
Dec 23 16:57:40 MK-Soft-VM5 sshd[26488]: Failed password for invalid user zeiger from 54.39.98.253 port 48678 ssh2
...
2019-12-24 06:41:33
198.108.67.36 attackbots
firewall-block, port(s): 50000/tcp
2019-12-24 06:26:59
222.186.180.147 attack
Brute-force attempt banned
2019-12-24 06:45:20
106.54.102.94 attackspam
Unauthorized connection attempt detected from IP address 106.54.102.94 to port 22
2019-12-24 06:51:35
106.52.234.191 attackbots
Dec 23 10:54:43 ny01 sshd[26276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.234.191
Dec 23 10:54:44 ny01 sshd[26276]: Failed password for invalid user psaadm from 106.52.234.191 port 55773 ssh2
Dec 23 11:00:00 ny01 sshd[27332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.234.191
2019-12-24 06:46:33

Recently Reported IPs

116.99.214.62 219.190.232.246 196.89.121.98 134.95.127.99
115.223.140.11 94.214.247.163 120.35.178.208 32.198.203.144
90.237.0.234 105.165.16.243 88.34.35.151 198.175.174.253
189.105.161.200 71.218.132.130 181.178.18.116 204.176.58.53
101.31.13.171 154.105.201.77 84.248.17.85 194.154.204.5