Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.220.43.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47223
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.220.43.216.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:37:58 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 216.43.220.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 216.43.220.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
95.217.62.107 attack
19/7/18@06:58:29: FAIL: Alarm-Intrusion address from=95.217.62.107
...
2019-07-18 19:45:57
202.98.213.216 attackspam
Jul 18 13:56:19 server sshd\[11400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.98.213.216
Jul 18 13:56:22 server sshd\[11400\]: Failed password for invalid user bas from 202.98.213.216 port 12733 ssh2
Jul 18 13:59:14 server sshd\[19465\]: Invalid user helen from 202.98.213.216 port 15966
Jul 18 13:59:14 server sshd\[19465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.98.213.216
Jul 18 13:59:17 server sshd\[19465\]: Failed password for invalid user helen from 202.98.213.216 port 15966 ssh2
2019-07-18 19:10:23
51.83.76.36 attackbots
Jul 18 13:17:27 SilenceServices sshd[31172]: Failed password for root from 51.83.76.36 port 42314 ssh2
Jul 18 13:23:39 SilenceServices sshd[2610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.76.36
Jul 18 13:23:41 SilenceServices sshd[2610]: Failed password for invalid user he from 51.83.76.36 port 38912 ssh2
2019-07-18 19:29:19
200.59.130.99 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 02:12:41,066 INFO [shellcode_manager] (200.59.130.99) no match, writing hexdump (ea07fc203e51519b978000b6b64ae938 :2396353) - MS17010 (EternalBlue)
2019-07-18 19:08:27
5.196.68.203 attackbots
Jul 18 13:07:36 microserver sshd[52197]: Invalid user utente from 5.196.68.203 port 45146
Jul 18 13:07:36 microserver sshd[52197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.68.203
Jul 18 13:07:38 microserver sshd[52197]: Failed password for invalid user utente from 5.196.68.203 port 45146 ssh2
Jul 18 13:16:34 microserver sshd[53615]: Invalid user jc from 5.196.68.203 port 56712
Jul 18 13:16:34 microserver sshd[53615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.68.203
Jul 18 13:28:17 microserver sshd[55077]: Invalid user me from 5.196.68.203 port 52382
Jul 18 13:28:17 microserver sshd[55077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.68.203
Jul 18 13:28:18 microserver sshd[55077]: Failed password for invalid user me from 5.196.68.203 port 52382 ssh2
Jul 18 13:34:08 microserver sshd[55926]: Invalid user philip from 5.196.68.203 port 50218
Jul 18 13:34:08 micr
2019-07-18 19:51:53
165.227.93.58 attackspambots
Jul 18 12:58:17 bouncer sshd\[26924\]: Invalid user ys from 165.227.93.58 port 53716
Jul 18 12:58:17 bouncer sshd\[26924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.93.58 
Jul 18 12:58:19 bouncer sshd\[26924\]: Failed password for invalid user ys from 165.227.93.58 port 53716 ssh2
...
2019-07-18 19:53:41
104.248.82.210 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-18 19:25:21
45.55.42.17 attackspam
Triggered by Fail2Ban
2019-07-18 19:24:25
222.127.99.45 attack
$f2bV_matches
2019-07-18 19:11:37
104.238.81.58 attackbots
Jul 18 11:05:39 *** sshd[8235]: Invalid user astral from 104.238.81.58
2019-07-18 19:14:31
51.77.194.232 attackbots
Jul 18 11:58:26 h2177944 sshd\[15419\]: Failed password for invalid user datacenter from 51.77.194.232 port 44134 ssh2
Jul 18 12:59:19 h2177944 sshd\[17615\]: Invalid user samba1 from 51.77.194.232 port 53042
Jul 18 12:59:19 h2177944 sshd\[17615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.194.232
Jul 18 12:59:21 h2177944 sshd\[17615\]: Failed password for invalid user samba1 from 51.77.194.232 port 53042 ssh2
...
2019-07-18 19:07:48
65.128.0.134 attackbotsspam
Automatic report - Banned IP Access
2019-07-18 19:50:07
182.184.61.94 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 09:43:18,499 INFO [amun_request_handler] PortScan Detected on Port: 445 (182.184.61.94)
2019-07-18 19:16:38
222.252.105.68 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 09:42:51,610 INFO [amun_request_handler] PortScan Detected on Port: 445 (222.252.105.68)
2019-07-18 19:26:16
78.160.100.89 attackspam
Automatic report - Port Scan Attack
2019-07-18 19:35:02

Recently Reported IPs

224.163.106.221 59.222.184.73 101.197.216.69 133.0.61.172
73.234.121.243 19.92.136.190 59.164.179.151 174.50.163.195
160.135.113.177 194.134.102.246 198.10.218.95 226.211.208.216
41.66.109.232 86.111.63.110 64.51.0.112 66.187.51.196
228.18.40.228 204.85.79.30 166.101.204.179 142.234.98.48