Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.194.21.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14535
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.194.21.162.			IN	A

;; AUTHORITY SECTION:
.			200	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022901 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 01 04:28:21 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 162.21.194.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 162.21.194.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.235.146.95 attack
Brute%20Force%20SSH
2020-09-08 09:03:37
198.46.202.17 attackbotsspam
SSH Invalid Login
2020-09-08 08:54:18
179.56.106.227 attack
Sep  8 01:01:23 sip sshd[19964]: Failed password for root from 179.56.106.227 port 34276 ssh2
Sep  8 01:01:24 sip sshd[19972]: Failed password for root from 179.56.106.227 port 34484 ssh2
2020-09-08 08:45:55
185.191.171.10 attack
07.09.2020 21:35:25 - Bad Robot 
Ignore Robots.txt
2020-09-08 08:36:08
165.22.113.66 attack
$f2bV_matches
2020-09-08 09:04:48
107.170.204.148 attackbots
Multiport scan 49 ports : 58 448 895 960 1070 2947 3379 3383 3927 4281 4284 5521 7362 8322 8544 10607 11338 11431 11858 12298 12506 12736 13261 13411 15947 16064 17802 17958 18596 20168 20283 21002 22414 22466 23372 24064 24423 24851 27347 27487 27693 27852 28116 29560 30532 32029 32057 32173 32548
2020-09-08 08:49:58
180.76.111.242 attackspam
Sep  8 02:32:37 mout sshd[13642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.111.242  user=root
Sep  8 02:32:39 mout sshd[13642]: Failed password for root from 180.76.111.242 port 33980 ssh2
2020-09-08 08:41:02
192.241.231.22 attack
[Sun Sep 06 17:44:43 2020] - DDoS Attack From IP: 192.241.231.22 Port: 34852
2020-09-08 08:56:44
42.3.31.69 attackbotsspam
Sep  7 18:50:46 ks10 sshd[894795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.3.31.69 
Sep  7 18:50:48 ks10 sshd[894795]: Failed password for invalid user ubuntu from 42.3.31.69 port 55530 ssh2
...
2020-09-08 08:33:44
167.248.133.20 attackbots
firewall-block, port(s): 8081/tcp
2020-09-08 09:02:00
45.118.144.77 attack
Trolling for resource vulnerabilities
2020-09-08 09:03:54
46.173.105.167 attack
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "support" at 2020-09-07T17:22:32Z
2020-09-08 08:28:53
112.120.156.177 attackspam
Scanned 3 times in the last 24 hours on port 22
2020-09-08 08:25:29
121.122.172.117 attack
firewall-block, port(s): 23/tcp
2020-09-08 09:07:33
94.54.17.183 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-08 08:45:34

Recently Reported IPs

93.223.187.202 191.186.57.215 213.250.125.231 203.46.140.173
185.192.143.210 194.135.169.174 60.98.114.228 191.180.42.191
78.4.203.127 54.221.169.196 128.113.173.196 90.24.167.8
31.85.118.139 188.215.134.129 112.137.152.31 52.90.146.6
187.233.161.63 93.142.210.219 187.109.1.235 117.188.3.7