Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.165.149.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25271
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.165.149.13.			IN	A

;; AUTHORITY SECTION:
.			502	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091402 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 15 10:22:21 CST 2022
;; MSG SIZE  rcvd: 106
Host info
13.149.165.45.in-addr.arpa domain name pointer dynamic-45-165-149-13.csimaisnet.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.149.165.45.in-addr.arpa	name = dynamic-45-165-149-13.csimaisnet.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.172 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172  user=root
Failed password for root from 112.85.42.172 port 55195 ssh2
Failed password for root from 112.85.42.172 port 55195 ssh2
Failed password for root from 112.85.42.172 port 55195 ssh2
Failed password for root from 112.85.42.172 port 55195 ssh2
2020-02-25 06:26:47
170.231.232.97 attackspambots
proto=tcp  .  spt=60187  .  dpt=25  .     Listed on    unsubscore also rbldns-ru and manitu-net     (209)
2020-02-25 06:35:46
138.68.70.13 attackbotsspam
bad bad
2020-02-25 06:19:08
198.23.192.74 attackbots
[2020-02-24 14:26:08] NOTICE[1148][C-0000b9b1] chan_sip.c: Call from '' (198.23.192.74:59178) to extension '770046213724610' rejected because extension not found in context 'public'.
[2020-02-24 14:26:08] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-24T14:26:08.724-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="770046213724610",SessionID="0x7fd82cf77db8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/198.23.192.74/59178",ACLName="no_extension_match"
[2020-02-24 14:35:42] NOTICE[1148][C-0000b9b9] chan_sip.c: Call from '' (198.23.192.74:57093) to extension '880046213724610' rejected because extension not found in context 'public'.
[2020-02-24 14:35:42] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-24T14:35:42.205-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="880046213724610",SessionID="0x7fd82c80d368",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/
...
2020-02-25 06:47:32
218.173.20.196 attackbotsspam
1582550187 - 02/24/2020 14:16:27 Host: 218.173.20.196/218.173.20.196 Port: 23 TCP Blocked
2020-02-25 06:48:47
115.159.107.118 attack
PHP Info File Request - Possible PHP Version Scan
2020-02-25 06:10:47
185.209.0.90 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 28389 proto: TCP cat: Misc Attack
2020-02-25 06:44:00
36.226.217.143 attackbots
Port probing on unauthorized port 26
2020-02-25 06:27:36
80.33.109.29 attackbots
1582550225 - 02/24/2020 14:17:05 Host: 80.33.109.29/80.33.109.29 Port: 445 TCP Blocked
2020-02-25 06:30:13
159.89.19.171 attack
Automatic report - XMLRPC Attack
2020-02-25 06:38:45
222.140.152.68 attackspambots
Unauthorized connection attempt detected from IP address 222.140.152.68 to port 23
2020-02-25 06:45:20
41.33.23.173 attackbotsspam
Unauthorized connection attempt from IP address 41.33.23.173 on Port 445(SMB)
2020-02-25 06:12:05
201.253.56.111 attackbotsspam
Unauthorized connection attempt from IP address 201.253.56.111 on Port 445(SMB)
2020-02-25 06:21:39
61.2.150.39 attack
1582550200 - 02/24/2020 14:16:40 Host: 61.2.150.39/61.2.150.39 Port: 445 TCP Blocked
2020-02-25 06:40:33
49.231.222.6 attackbots
Unauthorized connection attempt detected from IP address 49.231.222.6 to port 445
2020-02-25 06:17:53

Recently Reported IPs

27.122.58.170 61.238.103.132 80.219.138.126 143.202.163.94
62.84.32.239 209.14.136.176 14.97.238.50 149.34.242.5
62.197.155.19 188.166.215.133 206.189.146.108 182.112.33.184
153.0.195.71 54.211.96.113 79.225.70.55 61.80.193.22
123.139.240.242 69.28.93.255 193.253.229.61 112.226.250.51