Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: São Paulo

Region: Sao Paulo

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.199.136.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30628
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.199.136.164.			IN	A

;; AUTHORITY SECTION:
.			521	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022071002 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jul 11 07:22:06 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 164.136.199.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.136.199.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
101.68.70.14 attack
$f2bV_matches
2019-08-20 04:32:02
118.25.177.241 attack
Aug 19 21:22:43 vps647732 sshd[13711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.177.241
Aug 19 21:22:45 vps647732 sshd[13711]: Failed password for invalid user benites from 118.25.177.241 port 38186 ssh2
...
2019-08-20 05:14:33
95.167.39.12 attack
Aug 19 22:46:47 vps691689 sshd[1943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.39.12
Aug 19 22:46:49 vps691689 sshd[1943]: Failed password for invalid user gary from 95.167.39.12 port 45370 ssh2
...
2019-08-20 04:51:40
156.221.165.135 attackspambots
" "
2019-08-20 04:45:14
85.28.83.23 attack
Aug 19 22:13:07 cp sshd[10858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.28.83.23
2019-08-20 05:02:28
94.191.79.156 attack
2019-08-20T01:57:07.703532enmeeting.mahidol.ac.th sshd\[1248\]: Invalid user eng from 94.191.79.156 port 48114
2019-08-20T01:57:07.717827enmeeting.mahidol.ac.th sshd\[1248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.79.156
2019-08-20T01:57:09.020079enmeeting.mahidol.ac.th sshd\[1248\]: Failed password for invalid user eng from 94.191.79.156 port 48114 ssh2
...
2019-08-20 04:46:19
103.207.36.205 attackbots
Aug 20 01:56:43 lcl-usvr-01 sshd[14379]: Invalid user admin from 103.207.36.205
2019-08-20 05:09:15
51.75.30.199 attackspambots
Aug 19 23:07:54 SilenceServices sshd[4708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.30.199
Aug 19 23:07:56 SilenceServices sshd[4708]: Failed password for invalid user mirror03 from 51.75.30.199 port 43496 ssh2
Aug 19 23:11:47 SilenceServices sshd[7106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.30.199
2019-08-20 05:21:20
137.74.159.147 attack
Aug 19 23:12:53 plex sshd[21285]: Invalid user 12345 from 137.74.159.147 port 43428
2019-08-20 05:22:15
200.23.225.170 attackspam
failed_logins
2019-08-20 05:04:22
106.13.1.63 attackbotsspam
Aug 19 21:08:51 game-panel sshd[9993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.1.63
Aug 19 21:08:53 game-panel sshd[9993]: Failed password for invalid user postgres from 106.13.1.63 port 16902 ssh2
Aug 19 21:13:35 game-panel sshd[10277]: Failed password for root from 106.13.1.63 port 56216 ssh2
2019-08-20 05:23:27
88.247.49.66 attackspam
Automatic report - Port Scan Attack
2019-08-20 04:32:33
128.199.83.29 attack
Aug 19 20:34:28 ip-172-31-1-72 sshd\[17463\]: Invalid user casey from 128.199.83.29
Aug 19 20:34:28 ip-172-31-1-72 sshd\[17463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.83.29
Aug 19 20:34:31 ip-172-31-1-72 sshd\[17463\]: Failed password for invalid user casey from 128.199.83.29 port 57338 ssh2
Aug 19 20:39:23 ip-172-31-1-72 sshd\[17654\]: Invalid user iso from 128.199.83.29
Aug 19 20:39:23 ip-172-31-1-72 sshd\[17654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.83.29
2019-08-20 05:10:31
148.70.65.131 attackbotsspam
Aug 19 19:59:04 MK-Soft-VM7 sshd\[19651\]: Invalid user usr from 148.70.65.131 port 40030
Aug 19 19:59:04 MK-Soft-VM7 sshd\[19651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.65.131
Aug 19 19:59:06 MK-Soft-VM7 sshd\[19651\]: Failed password for invalid user usr from 148.70.65.131 port 40030 ssh2
...
2019-08-20 05:08:46
35.234.206.93 attack
Aug 19 23:07:57 root sshd[28414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.234.206.93 
Aug 19 23:07:59 root sshd[28414]: Failed password for invalid user teste from 35.234.206.93 port 54616 ssh2
Aug 19 23:12:43 root sshd[28490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.234.206.93 
...
2019-08-20 05:21:00

Recently Reported IPs

91.188.246.115 85.208.87.39 107.172.180.109 85.208.211.177
185.77.220.70 77.83.87.140 190.8.138.169 189.70.151.42
226.1.14.201 85.209.151.14 238.215.2.13 91.242.228.104
194.237.10.242 85.208.210.186 95.181.149.165 193.233.143.165
187.140.95.74 20.24.100.156 193.233.142.79 192.177.158.202