Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: Origin X S. de R.L. de C.V.

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attackbots
Sep 16 14:05:14 *hidden* postfix/postscreen[35410]: DNSBL rank 3 for [45.164.23.134]:49636
2020-10-10 23:23:31
attackbots
Sep 16 14:05:14 *hidden* postfix/postscreen[35410]: DNSBL rank 3 for [45.164.23.134]:49636
2020-10-10 15:12:53
Comments on same subnet:
IP Type Details Datetime
45.164.236.97 attack
Attempted connection to port 445.
2020-09-04 00:09:47
45.164.236.97 attack
Attempted connection to port 445.
2020-09-03 15:38:52
45.164.236.97 attackspambots
Attempted connection to port 445.
2020-09-03 07:48:19
45.164.236.21 attackspam
Unauthorized connection attempt from IP address 45.164.236.21 on Port 445(SMB)
2020-08-25 05:10:38
45.164.234.6 attackspambots
port scan and connect, tcp 23 (telnet)
2020-05-13 01:05:56
45.164.236.97 attackspam
Unauthorized connection attempt from IP address 45.164.236.97 on Port 445(SMB)
2020-04-07 05:35:53
45.164.236.97 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 19-09-2019 20:29:16.
2019-09-20 08:56:13
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.164.23.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20719
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.164.23.134.			IN	A

;; AUTHORITY SECTION:
.			132	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020101000 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 10 15:12:49 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 134.23.164.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.23.164.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.254.145.29 attackspambots
Jul 17 19:49:29 OPSO sshd\[11752\]: Invalid user at from 182.254.145.29 port 50414
Jul 17 19:49:29 OPSO sshd\[11752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.145.29
Jul 17 19:49:31 OPSO sshd\[11752\]: Failed password for invalid user at from 182.254.145.29 port 50414 ssh2
Jul 17 19:53:10 OPSO sshd\[12409\]: Invalid user mfo from 182.254.145.29 port 44231
Jul 17 19:53:10 OPSO sshd\[12409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.145.29
2020-07-18 02:32:37
70.113.174.36 attackbots
Jul 17 14:09:22 mintao sshd\[23001\]: Invalid user admin from 70.113.174.36\
Jul 17 14:09:26 mintao sshd\[23005\]: Invalid user admin from 70.113.174.36\
2020-07-18 02:53:12
185.175.93.24 attackspam
firewall-block, port(s): 5955/tcp, 5961/tcp
2020-07-18 02:49:08
162.243.116.41 attackspambots
Invalid user lijing from 162.243.116.41 port 35386
2020-07-18 02:41:04
150.107.176.130 attack
"fail2ban match"
2020-07-18 02:41:21
222.186.180.147 attackbots
Jul 17 21:04:07 vpn01 sshd[26452]: Failed password for root from 222.186.180.147 port 6634 ssh2
Jul 17 21:04:10 vpn01 sshd[26452]: Failed password for root from 222.186.180.147 port 6634 ssh2
...
2020-07-18 03:04:41
222.186.180.17 attack
Jul 17 18:37:36 scw-6657dc sshd[27927]: Failed password for root from 222.186.180.17 port 20310 ssh2
Jul 17 18:37:36 scw-6657dc sshd[27927]: Failed password for root from 222.186.180.17 port 20310 ssh2
Jul 17 18:37:39 scw-6657dc sshd[27927]: Failed password for root from 222.186.180.17 port 20310 ssh2
...
2020-07-18 02:52:19
93.42.132.157 attackbots
Automatic report - Banned IP Access
2020-07-18 02:45:01
188.168.82.246 attackspam
2020-07-17T21:15:48.567587lavrinenko.info sshd[21996]: Invalid user admin from 188.168.82.246 port 50772
2020-07-17T21:15:48.574177lavrinenko.info sshd[21996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.168.82.246
2020-07-17T21:15:48.567587lavrinenko.info sshd[21996]: Invalid user admin from 188.168.82.246 port 50772
2020-07-17T21:15:50.214026lavrinenko.info sshd[21996]: Failed password for invalid user admin from 188.168.82.246 port 50772 ssh2
2020-07-17T21:20:15.649454lavrinenko.info sshd[22055]: Invalid user kafka from 188.168.82.246 port 37398
...
2020-07-18 02:34:51
138.68.86.98 attackbotsspam
Multiple SSH authentication failures from 138.68.86.98
2020-07-18 02:44:22
188.219.251.4 attackbots
Jul 17 19:18:09 *hidden* sshd[41655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.219.251.4 Jul 17 19:18:11 *hidden* sshd[41655]: Failed password for invalid user aiswaria from 188.219.251.4 port 36781 ssh2
2020-07-18 02:28:48
151.69.206.10 attack
Jul 17 20:41:39 rancher-0 sshd[416083]: Invalid user git from 151.69.206.10 port 49430
...
2020-07-18 02:42:09
119.44.20.30 attack
Jul 17 15:46:22 jumpserver sshd[105454]: Invalid user ftp from 119.44.20.30 port 63289
Jul 17 15:46:24 jumpserver sshd[105454]: Failed password for invalid user ftp from 119.44.20.30 port 63289 ssh2
Jul 17 15:53:13 jumpserver sshd[105532]: Invalid user biable from 119.44.20.30 port 32873
...
2020-07-18 02:59:52
125.215.207.44 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-18 03:01:22
35.188.182.88 attackspambots
Jul 17 14:23:13 logopedia-1vcpu-1gb-nyc1-01 sshd[145844]: Invalid user hp from 35.188.182.88 port 55884
...
2020-07-18 02:33:33

Recently Reported IPs

89.103.162.219 167.99.194.74 113.22.236.128 45.141.156.196
95.37.78.107 37.49.225.221 51.77.211.228 149.62.203.169
208.186.113.144 111.202.190.7 45.170.220.89 46.8.193.19
93.103.182.143 47.56.229.85 86.91.244.200 41.216.181.3
2.57.122.181 167.172.213.83 117.192.225.203 91.211.88.113