Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Videira

Region: Santa Catarina

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.163.134.214 attack
Portscan detected
2020-08-01 01:49:43
45.163.134.197 attack
 TCP (SYN) 45.163.134.197:24093 -> port 8080, len 40
2020-05-20 07:08:26
45.163.134.246 attackspam
Unauthorized connection attempt detected from IP address 45.163.134.246 to port 23 [J]
2020-02-05 18:22:29
45.163.133.151 attack
DATE:2020-01-31 09:46:36, IP:45.163.133.151, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-01-31 19:33:37
45.163.133.130 attackbotsspam
Unauthorized connection attempt detected from IP address 45.163.133.130 to port 8080
2019-12-29 01:14:36
45.163.134.2 attackspam
web Attack on Website
2019-11-30 05:05:45
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.163.13.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24423
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.163.13.8.			IN	A

;; AUTHORITY SECTION:
.			400	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090601 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 07 08:56:33 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 8.13.163.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.13.163.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.143.223.146 attackbotsspam
2019-11-24T20:48:18.808650+01:00 lumpi kernel: [4447261.099045] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.223.146 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=59902 PROTO=TCP SPT=56916 DPT=4444 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-25 04:01:17
103.82.235.10 attackbots
Automatic report generated by Wazuh
2019-11-25 04:03:55
37.98.224.105 attackspambots
2019-11-24T17:35:41.695037shield sshd\[2566\]: Invalid user home from 37.98.224.105 port 56102
2019-11-24T17:35:41.699156shield sshd\[2566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.98.224.105
2019-11-24T17:35:43.113410shield sshd\[2566\]: Failed password for invalid user home from 37.98.224.105 port 56102 ssh2
2019-11-24T17:39:48.368250shield sshd\[4232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.98.224.105  user=root
2019-11-24T17:39:50.690881shield sshd\[4232\]: Failed password for root from 37.98.224.105 port 35418 ssh2
2019-11-25 03:37:28
104.248.173.228 attack
104.248.173.228 was recorded 45 times by 24 hosts attempting to connect to the following ports: 2376,4243,2375,2377. Incident counter (4h, 24h, all-time): 45, 350, 740
2019-11-25 04:10:12
51.89.240.216 attack
2019-11-24T18:06:23.143704MailD postfix/smtpd[32064]: warning: ip216.ip-51-89-240.eu[51.89.240.216]: SASL LOGIN authentication failed: authentication failure
2019-11-24T18:06:24.021319MailD postfix/smtpd[32064]: warning: ip216.ip-51-89-240.eu[51.89.240.216]: SASL LOGIN authentication failed: authentication failure
2019-11-24T18:06:24.317003MailD postfix/smtpd[32064]: warning: ip216.ip-51-89-240.eu[51.89.240.216]: SASL LOGIN authentication failed: authentication failure
2019-11-25 04:11:24
14.157.103.94 attackspambots
Bad crawling causing excessive 404 errors
2019-11-25 03:52:01
80.98.98.180 attackspambots
Nov 25 00:32:24 gw1 sshd[22756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.98.98.180
Nov 25 00:32:26 gw1 sshd[22756]: Failed password for invalid user dido from 80.98.98.180 port 48871 ssh2
...
2019-11-25 03:38:32
118.126.111.108 attackspambots
2019-11-24T14:48:47.826259abusebot.cloudsearch.cf sshd\[3451\]: Invalid user nildev from 118.126.111.108 port 40038
2019-11-25 03:45:21
45.182.137.16 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-25 03:44:02
83.97.20.167 attackspambots
11/24/2019-19:59:01.873567 83.97.20.167 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2019-11-25 03:58:06
122.228.19.80 attackspambots
122.228.19.80 was recorded 74 times by 26 hosts attempting to connect to the following ports: 1200,1962,7000,2376,9876,5985,9943,80,9002,3389,25,14265,8007,5009,2628,4730,3351,8001,55553,6000,2152,28784,2086,2323,8443,9100,5555,4070,62078,8554,6664,2638,123,53,9595,2222,993,20476,1777,3690,84,8000,5351,22,119,7547,9944,5000,16993,8025,4786,27017,9080,8123,4410,9160,20547,2121,8098,389,4369,50100,12000,9200. Incident counter (4h, 24h, all-time): 74, 418, 8838
2019-11-25 03:44:18
23.254.203.51 attackbots
Nov 23 06:56:38 mail sshd[19761]: Invalid user enrichetta from 23.254.203.51
Nov 23 06:56:38 mail sshd[19761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.254.203.51
Nov 23 06:56:38 mail sshd[19761]: Invalid user enrichetta from 23.254.203.51
Nov 23 06:56:40 mail sshd[19761]: Failed password for invalid user enrichetta from 23.254.203.51 port 60476 ssh2
...
2019-11-25 03:50:37
103.121.73.98 attack
PHI,WP GET /wp-login.php
GET /wp-login.php
2019-11-25 03:36:43
178.217.159.175 attack
Nov 24 15:30:52 carla sshd[19130]: Invalid user pi from 178.217.159.175
Nov 24 15:30:52 carla sshd[19132]: Invalid user pi from 178.217.159.175
Nov 24 15:30:52 carla sshd[19132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.217.159.175 
Nov 24 15:30:52 carla sshd[19130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.217.159.175 
Nov 24 15:30:55 carla sshd[19132]: Failed password for invalid user pi from 178.217.159.175 port 54318 ssh2
Nov 24 15:30:55 carla sshd[19130]: Failed password for invalid user pi from 178.217.159.175 port 54316 ssh2
Nov 24 15:30:55 carla sshd[19131]: Connection closed by 178.217.159.175
Nov 24 15:30:55 carla sshd[19133]: Connection closed by 178.217.159.175


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=178.217.159.175
2019-11-25 03:49:36
94.203.254.248 attack
Nov 24 17:12:25 v22019058497090703 sshd[5496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.203.254.248
Nov 24 17:12:25 v22019058497090703 sshd[5497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.203.254.248
Nov 24 17:12:27 v22019058497090703 sshd[5496]: Failed password for invalid user pi from 94.203.254.248 port 35800 ssh2
...
2019-11-25 03:42:59

Recently Reported IPs

158.176.97.134 167.21.157.34 67.236.14.243 97.143.70.185
166.171.197.238 77.174.80.8 176.192.146.244 152.86.36.47
32.155.64.147 46.147.216.224 68.248.112.76 77.175.155.115
195.14.209.141 124.65.106.233 20.195.201.36 101.161.123.170
113.116.238.117 113.147.242.102 115.241.196.233 179.53.154.172