Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aparecida d'Oeste

Region: Sao Paulo

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.180.42.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.180.42.160.			IN	A

;; AUTHORITY SECTION:
.			509	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023053102 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 01 08:00:35 CST 2023
;; MSG SIZE  rcvd: 106
Host info
160.42.180.45.in-addr.arpa domain name pointer clientes-45-180-42-160.upnetinformatica.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
160.42.180.45.in-addr.arpa	name = clientes-45-180-42-160.upnetinformatica.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
79.187.192.249 attackbots
Dec 28 22:33:17 zeus sshd[10491]: Failed password for root from 79.187.192.249 port 51063 ssh2
Dec 28 22:35:54 zeus sshd[10563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.187.192.249 
Dec 28 22:35:56 zeus sshd[10563]: Failed password for invalid user no-reply from 79.187.192.249 port 36616 ssh2
2019-12-29 06:40:43
77.123.155.201 attackspam
Dec 28 23:35:35 h2177944 sshd\[22440\]: Invalid user bigfoot from 77.123.155.201 port 37200
Dec 28 23:35:35 h2177944 sshd\[22440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.123.155.201
Dec 28 23:35:37 h2177944 sshd\[22440\]: Failed password for invalid user bigfoot from 77.123.155.201 port 37200 ssh2
Dec 28 23:38:12 h2177944 sshd\[22618\]: Invalid user lakeisha from 77.123.155.201 port 35334
Dec 28 23:38:12 h2177944 sshd\[22618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.123.155.201
...
2019-12-29 06:47:47
68.171.212.2 attackspambots
Automatic report - XMLRPC Attack
2019-12-29 07:06:47
103.35.64.7 attackbots
Dec 29 00:29:11 pkdns2 sshd\[53661\]: Failed password for root from 103.35.64.7 port 64616 ssh2Dec 29 00:29:24 pkdns2 sshd\[53666\]: Failed password for root from 103.35.64.7 port 50259 ssh2Dec 29 00:29:37 pkdns2 sshd\[53668\]: Failed password for root from 103.35.64.7 port 52592 ssh2Dec 29 00:29:50 pkdns2 sshd\[53672\]: Failed password for root from 103.35.64.7 port 54816 ssh2Dec 29 00:30:02 pkdns2 sshd\[53676\]: Failed password for root from 103.35.64.7 port 56927 ssh2Dec 29 00:30:05 pkdns2 sshd\[53676\]: Failed password for root from 103.35.64.7 port 56927 ssh2
...
2019-12-29 06:36:07
106.12.98.7 attack
Invalid user us from 106.12.98.7 port 51932
2019-12-29 07:13:53
222.186.175.212 attack
2019-12-28T23:14:34.103316abusebot-2.cloudsearch.cf sshd[18410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
2019-12-28T23:14:35.536154abusebot-2.cloudsearch.cf sshd[18410]: Failed password for root from 222.186.175.212 port 32922 ssh2
2019-12-28T23:14:38.141426abusebot-2.cloudsearch.cf sshd[18410]: Failed password for root from 222.186.175.212 port 32922 ssh2
2019-12-28T23:14:34.103316abusebot-2.cloudsearch.cf sshd[18410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
2019-12-28T23:14:35.536154abusebot-2.cloudsearch.cf sshd[18410]: Failed password for root from 222.186.175.212 port 32922 ssh2
2019-12-28T23:14:38.141426abusebot-2.cloudsearch.cf sshd[18410]: Failed password for root from 222.186.175.212 port 32922 ssh2
2019-12-28T23:14:34.103316abusebot-2.cloudsearch.cf sshd[18410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 
...
2019-12-29 07:15:21
45.95.168.105 attackbots
Dec 28 23:49:01 markkoudstaal sshd[18994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.168.105
Dec 28 23:49:03 markkoudstaal sshd[18994]: Failed password for invalid user hduser from 45.95.168.105 port 60398 ssh2
Dec 28 23:51:33 markkoudstaal sshd[19181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.168.105
2019-12-29 07:04:35
185.116.85.18 attackbotsspam
Unauthorized connection attempt detected from IP address 185.116.85.18 to port 445
2019-12-29 06:50:18
148.72.207.135 attackspambots
C1,WP GET /wp-login.php
2019-12-29 06:52:44
110.47.218.84 attackspambots
2019-12-28T22:35:39.850210shield sshd\[31369\]: Invalid user test from 110.47.218.84 port 41016
2019-12-28T22:35:39.853820shield sshd\[31369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.47.218.84
2019-12-28T22:35:42.732208shield sshd\[31369\]: Failed password for invalid user test from 110.47.218.84 port 41016 ssh2
2019-12-28T22:38:21.217598shield sshd\[31986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.47.218.84  user=root
2019-12-28T22:38:23.669365shield sshd\[31986\]: Failed password for root from 110.47.218.84 port 38272 ssh2
2019-12-29 06:42:03
122.192.255.228 attackbotsspam
Invalid user mezzaroba from 122.192.255.228 port 50944
2019-12-29 07:01:25
184.168.193.59 attackbotsspam
Automatic report - XMLRPC Attack
2019-12-29 07:14:17
85.209.0.24 attackspambots
Dec 28 22:01:03 v26 sshd[25004]: Did not receive identification string from 85.209.0.24 port 30326
Dec 28 22:01:03 v26 sshd[25009]: Did not receive identification string from 85.209.0.24 port 60674
Dec 28 22:01:03 v26 sshd[25005]: Did not receive identification string from 85.209.0.24 port 34640
Dec 28 22:01:03 v26 sshd[25008]: Did not receive identification string from 85.209.0.24 port 7560
Dec 28 22:01:03 v26 sshd[25006]: Did not receive identification string from 85.209.0.24 port 2840
Dec 28 22:01:03 v26 sshd[25007]: Did not receive identification string from 85.209.0.24 port 10092
Dec 28 22:01:06 v26 sshd[25010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.24  user=r.r
Dec 28 22:01:06 v26 sshd[25014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.24  user=r.r
Dec 28 22:01:06 v26 sshd[25013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ss........
-------------------------------
2019-12-29 07:14:47
1.160.78.244 attackbotsspam
port 23
2019-12-29 06:52:00
218.92.0.145 attack
Dec 28 23:50:53 MK-Soft-VM5 sshd[17981]: Failed password for root from 218.92.0.145 port 15154 ssh2
Dec 28 23:50:57 MK-Soft-VM5 sshd[17981]: Failed password for root from 218.92.0.145 port 15154 ssh2
...
2019-12-29 06:52:28

Recently Reported IPs

4.166.52.34 188.105.45.240 36.226.174.128 217.112.191.170
99.135.139.195 33.27.1.208 48.130.8.29 118.10.210.33
211.254.70.158 125.133.232.196 175.252.197.13 48.253.51.98
99.43.140.224 179.80.68.203 37.74.21.116 175.241.136.103
211.105.193.242 9.3.214.251 80.7.185.54 203.230.232.85