Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gaspar

Region: Santa Catarina

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.65.198.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46621
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.65.198.132.			IN	A

;; AUTHORITY SECTION:
.			255	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022071502 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 16 08:30:52 CST 2022
;; MSG SIZE  rcvd: 106
Host info
132.198.65.45.in-addr.arpa domain name pointer 45.65.198.132.bricktelecom.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.198.65.45.in-addr.arpa	name = 45.65.198.132.bricktelecom.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
31.184.215.237 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 16 - port: 6989 proto: TCP cat: Misc Attack
2019-11-05 04:51:30
106.13.125.159 attackbots
Nov  4 15:01:39 ny01 sshd[28887]: Failed password for root from 106.13.125.159 port 49040 ssh2
Nov  4 15:05:55 ny01 sshd[29274]: Failed password for root from 106.13.125.159 port 58142 ssh2
2019-11-05 04:25:03
223.167.128.12 attack
2019-11-04 13:01:36,825 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 223.167.128.12
2019-11-04 13:41:11,861 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 223.167.128.12
2019-11-04 14:14:02,116 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 223.167.128.12
2019-11-04 14:53:14,782 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 223.167.128.12
2019-11-04 15:29:35,047 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 223.167.128.12
...
2019-11-05 04:20:57
176.113.246.104 attack
/wp-content/themes/sketch/404.php + /alfa.php + /error_log.php + /license.php
2019-11-05 04:27:02
36.81.87.227 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-05 04:17:00
187.32.140.225 attack
Honeypot attack, port: 445, PTR: 187-032-140-225.static.ctbctelecom.com.br.
2019-11-05 04:25:49
171.221.241.89 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-05 04:34:43
183.150.166.181 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-05 04:09:09
35.195.95.63 attackspam
Wordpress xmlrpc
2019-11-05 04:29:41
138.186.108.87 attack
Nov  4 16:28:57 tuotantolaitos sshd[9383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.186.108.87
Nov  4 16:28:58 tuotantolaitos sshd[9383]: Failed password for invalid user ftpuser from 138.186.108.87 port 50772 ssh2
...
2019-11-05 04:40:12
113.100.14.249 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-05 04:24:46
41.221.146.138 attackspambots
Nov  4 20:01:08 venus sshd\[1514\]: Invalid user hadoop from 41.221.146.138 port 51689
Nov  4 20:01:08 venus sshd\[1514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.221.146.138
Nov  4 20:01:09 venus sshd\[1514\]: Failed password for invalid user hadoop from 41.221.146.138 port 51689 ssh2
...
2019-11-05 04:52:21
62.20.62.211 attack
5x Failed Password
2019-11-05 04:30:55
184.168.193.118 attackspam
Automatic report - XMLRPC Attack
2019-11-05 04:27:41
45.40.135.73 attack
45.40.135.73 - - \[04/Nov/2019:14:29:23 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
45.40.135.73 - - \[04/Nov/2019:14:29:29 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-05 04:22:06

Recently Reported IPs

125.87.92.233 192.177.142.203 104.173.7.44 2.55.65.70
46.50.160.5 220.123.30.120 124.159.123.87 104.210.215.18
146.56.131.81 216.161.134.37 130.164.148.152 124.186.5.237
38.53.165.34 42.58.196.80 130.93.59.223 200.233.157.57
90.24.140.184 200.19.179.114 194.35.226.89 122.188.215.225