Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Planura

Region: Minas Gerais

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.162.98.164 attackbots
Automatic report - Port Scan Attack
2020-07-01 15:09:26
45.162.98.103 attack
Automatic report - Banned IP Access
2020-05-31 00:25:06
45.162.98.98 attackspam
23/tcp
[2020-02-20]1pkt
2020-05-09 18:41:40
45.162.98.72 attackbotsspam
Automatic report - Port Scan Attack
2020-02-13 07:45:43
45.162.98.70 attack
trying to access non-authorized port
2020-02-12 15:46:22
45.162.98.207 attackspambots
Automatic report - Port Scan Attack
2020-02-11 19:37:05
45.162.98.11 attackspambots
Automatic report - Port Scan Attack
2019-12-05 22:00:59
45.162.98.194 attackbots
Automatic report - Port Scan Attack
2019-12-02 15:19:56
45.162.98.84 attack
Automatic report - Port Scan Attack
2019-11-24 01:46:33
45.162.98.89 attackspam
Automatic report - Port Scan Attack
2019-11-18 23:10:25
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.162.98.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28228
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.162.98.61.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050400 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 04 14:50:30 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 61.98.162.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 61.98.162.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
86.166.86.163 attackspam
Automatic report - Banned IP Access
2020-05-29 13:55:22
104.248.40.177 attack
104.248.40.177 - - [29/May/2020:05:54:26 +0200] "GET /wp-login.php HTTP/1.1" 200 5865 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.40.177 - - [29/May/2020:05:54:26 +0200] "POST /wp-login.php HTTP/1.1" 200 6116 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.40.177 - - [29/May/2020:05:54:27 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-29 14:06:27
107.180.238.240 attackspambots
scan z
2020-05-29 13:41:35
43.240.247.234 attackspambots
May 29 07:55:12 legacy sshd[32455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.240.247.234
May 29 07:55:15 legacy sshd[32455]: Failed password for invalid user dialer from 43.240.247.234 port 33690 ssh2
May 29 07:59:10 legacy sshd[32525]: Failed password for root from 43.240.247.234 port 53572 ssh2
...
2020-05-29 14:18:42
222.186.30.57 attackbots
May 29 06:11:11 ip-172-31-61-156 sshd[11628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57  user=root
May 29 06:11:13 ip-172-31-61-156 sshd[11628]: Failed password for root from 222.186.30.57 port 13040 ssh2
...
2020-05-29 14:12:27
34.89.240.117 attackbotsspam
URL Probing: /test/wp-includes/wlwmanifest.xml
2020-05-29 13:42:32
137.74.44.162 attackspam
odoo8
...
2020-05-29 13:53:52
61.133.232.253 attackbots
SSH Brute Force
2020-05-29 14:09:11
212.129.60.155 attackbots
[2020-05-29 01:36:22] NOTICE[1157][C-0000a566] chan_sip.c: Call from '' (212.129.60.155:51581) to extension '67011972592277524' rejected because extension not found in context 'public'.
[2020-05-29 01:36:22] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-29T01:36:22.829-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="67011972592277524",SessionID="0x7f5f1039ca78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.129.60.155/51581",ACLName="no_extension_match"
[2020-05-29 01:39:05] NOTICE[1157][C-0000a569] chan_sip.c: Call from '' (212.129.60.155:52098) to extension '68011972592277524' rejected because extension not found in context 'public'.
[2020-05-29 01:39:05] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-29T01:39:05.672-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="68011972592277524",SessionID="0x7f5f100266a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress
...
2020-05-29 14:03:33
185.220.101.198 attackbots
Unauthorized connection attempt detected from IP address 185.220.101.198 to port 8545
2020-05-29 14:17:53
68.183.55.223 attack
firewall-block, port(s): 15593/tcp
2020-05-29 13:42:08
178.150.14.250 attackspam
20 attempts against mh-misbehave-ban on twig
2020-05-29 14:00:43
91.121.221.195 attackspambots
20 attempts against mh-ssh on cloud
2020-05-29 14:04:06
36.155.112.131 attackspambots
May 29 07:10:47 vmi345603 sshd[22266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.112.131
May 29 07:10:49 vmi345603 sshd[22266]: Failed password for invalid user admin from 36.155.112.131 port 57832 ssh2
...
2020-05-29 13:58:19
186.179.182.5 attackspambots
(SR/Suriname/-) SMTP Bruteforcing attempts
2020-05-29 14:13:43

Recently Reported IPs

152.1.14.53 114.79.38.229 159.226.116.143 137.82.3.35
140.116.155.50 114.79.38.93 120.114.241.22 110.226.163.167
197.51.253.51 66.96.230.52 140.116.215.221 114.142.170.44
140.116.19.72 130.149.1.70 132.74.77.209 65.110.255.38
140.116.26.115 116.206.40.66 140.116.214.190 140.116.157.169