Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.93.16.154 attack
Scan port
2023-09-26 16:42:07
45.93.16.154 attack
Scan port
2023-09-14 12:36:57
45.93.16.154 attack
Scan port
2023-09-14 12:35:56
45.93.16.214 attack
Scan port
2023-08-15 12:42:10
45.93.16.240 attack
Scan port
2023-08-02 12:48:29
45.93.16.48 attack
Scan port DDoS
2023-03-23 15:05:07
45.93.16.216 attack
Scan port DDoS
2023-03-23 15:04:54
45.93.16.216 attack
Scan port DDoS
2023-03-23 15:04:28
45.93.16.81 attack
Scan port DDoS
2023-03-23 15:04:05
45.93.16.32 attack
Port scan
2023-02-08 13:52:26
45.93.16.23 attack
Port scan
2023-01-23 13:54:04
45.93.16.100 attack
Port scan
2023-01-23 13:52:29
45.93.16.22 attack
DdoS
2023-01-23 13:50:44
45.93.16.189 attack
Brute-force
2023-01-23 13:48:42
45.93.16.24 attack
port scan
2023-01-20 13:43:49
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.93.16.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48153
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.93.16.94.			IN	A

;; AUTHORITY SECTION:
.			206	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062901 1800 900 604800 86400

;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 29 23:23:30 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 94.16.93.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 94.16.93.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.242.23.184 attack
Triggered: repeated knocking on closed ports.
2019-12-03 23:28:48
222.186.175.215 attackbotsspam
Dec  3 16:32:35 v22018086721571380 sshd[3443]: error: maximum authentication attempts exceeded for root from 222.186.175.215 port 26440 ssh2 [preauth]
2019-12-03 23:33:18
113.128.65.45 attackbots
A spam blank email was sent from this SMTP server. This spam email attempted to camouflage the SMTP server with a KDDI's legitimate server. All To headers of this kind of spam emails were "To: undisclosed-recipients:;".
2019-12-03 23:13:52
83.110.21.201 attack
Unauthorized connection attempt from IP address 83.110.21.201 on Port 445(SMB)
2019-12-03 23:21:23
177.42.133.97 attack
Unauthorized connection attempt from IP address 177.42.133.97 on Port 445(SMB)
2019-12-03 23:11:41
196.190.63.158 attack
Unauthorized connection attempt from IP address 196.190.63.158 on Port 445(SMB)
2019-12-03 23:01:03
106.13.71.209 attackbots
PHP DIESCAN Information Disclosure Vulnerability
2019-12-03 23:21:01
103.27.238.107 attack
Dec  3 14:21:48 localhost sshd\[12886\]: Invalid user FuwuqiXP from 103.27.238.107 port 47630
Dec  3 14:21:48 localhost sshd\[12886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.238.107
Dec  3 14:21:49 localhost sshd\[12886\]: Failed password for invalid user FuwuqiXP from 103.27.238.107 port 47630 ssh2
Dec  3 14:30:11 localhost sshd\[13124\]: Invalid user smecherul from 103.27.238.107 port 58524
Dec  3 14:30:11 localhost sshd\[13124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.238.107
...
2019-12-03 23:18:11
182.61.26.50 attackspambots
$f2bV_matches
2019-12-03 23:22:10
159.203.165.197 attackspambots
Dec  3 04:54:22 kmh-wmh-003-nbg03 sshd[15059]: Invalid user server from 159.203.165.197 port 38120
Dec  3 04:54:22 kmh-wmh-003-nbg03 sshd[15059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.165.197
Dec  3 04:54:24 kmh-wmh-003-nbg03 sshd[15059]: Failed password for invalid user server from 159.203.165.197 port 38120 ssh2
Dec  3 04:54:24 kmh-wmh-003-nbg03 sshd[15059]: Received disconnect from 159.203.165.197 port 38120:11: Bye Bye [preauth]
Dec  3 04:54:24 kmh-wmh-003-nbg03 sshd[15059]: Disconnected from 159.203.165.197 port 38120 [preauth]
Dec  3 05:04:04 kmh-wmh-003-nbg03 sshd[16188]: Invalid user skibba from 159.203.165.197 port 59122
Dec  3 05:04:04 kmh-wmh-003-nbg03 sshd[16188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.165.197
Dec  3 05:04:06 kmh-wmh-003-nbg03 sshd[16188]: Failed password for invalid user skibba from 159.203.165.197 port 59122 ssh2
Dec  3 05:15:........
-------------------------------
2019-12-03 23:09:02
27.254.90.106 attackspam
Dec  3 16:23:01 markkoudstaal sshd[7626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.90.106
Dec  3 16:23:03 markkoudstaal sshd[7626]: Failed password for invalid user ilysa from 27.254.90.106 port 50323 ssh2
Dec  3 16:29:42 markkoudstaal sshd[8266]: Failed password for root from 27.254.90.106 port 54596 ssh2
2019-12-03 23:32:48
86.56.11.228 attackspambots
Dec  3 04:40:13 kapalua sshd\[30428\]: Invalid user matzke from 86.56.11.228
Dec  3 04:40:13 kapalua sshd\[30428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cable-86-56-11-228.cust.telecolumbus.net
Dec  3 04:40:15 kapalua sshd\[30428\]: Failed password for invalid user matzke from 86.56.11.228 port 56340 ssh2
Dec  3 04:48:23 kapalua sshd\[31193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cable-86-56-11-228.cust.telecolumbus.net  user=root
Dec  3 04:48:25 kapalua sshd\[31193\]: Failed password for root from 86.56.11.228 port 39384 ssh2
2019-12-03 22:56:01
164.132.81.106 attackbotsspam
Dec  3 16:11:03 vps666546 sshd\[12022\]: Invalid user platinum from 164.132.81.106 port 44090
Dec  3 16:11:03 vps666546 sshd\[12022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.81.106
Dec  3 16:11:05 vps666546 sshd\[12022\]: Failed password for invalid user platinum from 164.132.81.106 port 44090 ssh2
Dec  3 16:16:56 vps666546 sshd\[12278\]: Invalid user mysql from 164.132.81.106 port 57176
Dec  3 16:16:56 vps666546 sshd\[12278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.81.106
...
2019-12-03 23:23:04
190.145.222.162 attack
Unauthorized connection attempt from IP address 190.145.222.162 on Port 445(SMB)
2019-12-03 23:08:01
113.125.25.73 attackspam
2019-12-03T15:01:19.085918abusebot-6.cloudsearch.cf sshd\[10253\]: Invalid user xn from 113.125.25.73 port 33134
2019-12-03 23:03:44

Recently Reported IPs

186.117.174.58 137.226.207.148 31.91.57.11 189.130.250.171
192.24.225.62 137.226.208.246 137.226.209.236 201.143.219.37
201.146.19.1 201.194.194.6 52.234.2.41 181.167.171.190
186.97.217.50 201.103.44.18 177.17.13.33 181.199.67.10
187.171.40.12 191.252.101.97 187.192.167.22 180.76.34.70