Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: São Paulo

Region: Sao Paulo

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
95.164.50.126 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-18 20:32:47
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '95.164.5.0 - 95.164.5.255'

% Abuse contact for '95.164.5.0 - 95.164.5.255' is 'abuse@the.hosting'

inetnum:        95.164.5.0 - 95.164.5.255
netname:        THE-HOSTING
country:        BR
geofeed:        https://the.hosting/geofeed.csv
org:            ORG-THE3-RIPE
admin-c:        THE3
tech-c:         THE3
status:         ASSIGNED PA
mnt-by:         THE-HOSTING-MNT
created:        2024-01-30T20:17:12Z
last-modified:  2025-05-28T22:56:29Z
source:         RIPE

organisation:   ORG-THE3-RIPE
org-name:       WorkTitans B.V.
org-type:       OTHER
address:        Hoge Bothofstraat 39, 7511 ZA Enschede, Netherlands
country:        NL
abuse-c:        THE666
mnt-ref:        THE-HOSTING-MNT
mnt-ref:        MEREZHA-MNT
mnt-ref:        LVNET-MNT
mnt-by:         THE-HOSTING-MNT
created:        2025-05-28T17:30:07Z
last-modified:  2025-12-03T18:20:25Z
source:         RIPE # Filtered

role:           THE-HOSTING
address:        Hoge Bothofstraat 39, 7511 ZA Enschede, Netherlands
nic-hdl:        THE3
mnt-by:         THE-HOSTING-MNT
created:        2025-05-28T17:31:22Z
last-modified:  2025-05-28T17:31:22Z
source:         RIPE # Filtered

% Information related to '95.164.5.0/24AS209847'

route:          95.164.5.0/24
origin:         AS209847
mnt-by:         THE-HOSTING-MNT
created:        2025-09-11T00:15:25Z
last-modified:  2025-09-11T00:15:25Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.120 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.164.5.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22596
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;95.164.5.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020200 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 03 01:00:02 CST 2026
;; MSG SIZE  rcvd: 104
Host info
48.5.164.95.in-addr.arpa domain name pointer vm3909978.example.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.5.164.95.in-addr.arpa	name = vm3909978.example.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
82.207.114.64 attackbotsspam
Jan  8 07:45:01 onepro1 sshd[4222]: Failed password for invalid user cemergen from 82.207.114.64 port 60379 ssh2
Jan  8 07:57:42 onepro1 sshd[4230]: Failed password for invalid user ftpuser from 82.207.114.64 port 60916 ssh2
Jan  8 08:03:13 onepro1 sshd[4234]: Failed password for invalid user ou from 82.207.114.64 port 42666 ssh2
2020-01-09 05:09:07
88.198.151.203 attackspam
Unauthorized connection attempt detected from IP address 88.198.151.203 to port 3389 [T]
2020-01-09 05:28:17
218.13.183.234 attack
Unauthorized connection attempt detected from IP address 218.13.183.234 to port 1433 [T]
2020-01-09 05:18:37
200.105.169.77 attackspam
Unauthorized connection attempt from IP address 200.105.169.77 on Port 445(SMB)
2020-01-09 05:07:59
222.180.171.244 attackspam
Unauthorized connection attempt detected from IP address 222.180.171.244 to port 3389 [T]
2020-01-09 05:16:48
117.0.38.19 attackspam
Unauthorized connection attempt from IP address 117.0.38.19 on Port 445(SMB)
2020-01-09 05:12:07
182.52.211.122 attackspambots
Unauthorized connection attempt detected from IP address 182.52.211.122 to port 445 [T]
2020-01-09 05:21:03
118.25.54.60 attack
Jan  8 22:11:46 icinga sshd[3110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.54.60
Jan  8 22:11:49 icinga sshd[3110]: Failed password for invalid user cz from 118.25.54.60 port 33536 ssh2
...
2020-01-09 05:33:52
49.88.112.116 attackspam
Jan  8 22:26:07 root sshd[27229]: Failed password for root from 49.88.112.116 port 37024 ssh2
Jan  8 22:26:10 root sshd[27229]: Failed password for root from 49.88.112.116 port 37024 ssh2
Jan  8 22:26:14 root sshd[27229]: Failed password for root from 49.88.112.116 port 37024 ssh2
...
2020-01-09 05:31:23
201.242.143.173 attackspambots
1578488591 - 01/08/2020 14:03:11 Host: 201.242.143.173/201.242.143.173 Port: 445 TCP Blocked
2020-01-09 05:11:03
187.178.20.224 attack
Telnet/23 MH Probe, BF, Hack -
2020-01-09 05:12:33
182.213.217.77 attack
Jan  8 13:49:37 h2034429 postfix/smtpd[32173]: connect from unknown[182.213.217.77]
Jan x@x
Jan  8 13:49:39 h2034429 postfix/smtpd[32173]: lost connection after DATA from unknown[182.213.217.77]
Jan  8 13:49:39 h2034429 postfix/smtpd[32173]: disconnect from unknown[182.213.217.77] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4
Jan  8 13:49:48 h2034429 postfix/smtpd[32196]: connect from unknown[182.213.217.77]
Jan x@x
Jan  8 13:49:50 h2034429 postfix/smtpd[32196]: lost connection after DATA from unknown[182.213.217.77]
Jan  8 13:49:50 h2034429 postfix/smtpd[32196]: disconnect from unknown[182.213.217.77] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4
Jan  8 13:49:58 h2034429 postfix/smtpd[32196]: connect from unknown[182.213.217.77]
Jan x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=182.213.217.77
2020-01-09 05:05:27
122.51.222.18 attackspam
Jan  8 19:53:06 marvibiene sshd[4312]: Invalid user ff from 122.51.222.18 port 46744
Jan  8 19:53:06 marvibiene sshd[4312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.222.18
Jan  8 19:53:06 marvibiene sshd[4312]: Invalid user ff from 122.51.222.18 port 46744
Jan  8 19:53:07 marvibiene sshd[4312]: Failed password for invalid user ff from 122.51.222.18 port 46744 ssh2
...
2020-01-09 05:00:56
185.153.196.80 attackspambots
Unauthorized connection attempt detected from IP address 185.153.196.80 to port 3923 [T]
2020-01-09 05:19:06
118.24.205.97 attackspam
Unauthorized connection attempt detected from IP address 118.24.205.97 to port 23 [T]
2020-01-09 05:25:18

Recently Reported IPs

199.96.167.19 117.205.80.98 233.30.41.88 43.157.94.244
255.43.225.152 115.45.40.128 178.239.123.228 111.178.61.25
49.234.76.21 209.54.104.45 47.92.146.183 157.173.102.59
149.1.126.65 149.1.126.197 116.1.215.173 34.82.98.72
42.180.227.130 54.85.134.46 43.136.167.214 103.236.95.173