Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.4.245.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 248
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.4.245.54.			IN	A

;; AUTHORITY SECTION:
.			548	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 23:38:37 CST 2022
;; MSG SIZE  rcvd: 103
Host info
54.245.4.1.in-addr.arpa domain name pointer node-n5i.pool-1-4.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.245.4.1.in-addr.arpa	name = node-n5i.pool-1-4.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.211.78.82 attackbots
May  1 08:23:47 santamaria sshd\[30886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.78.82  user=root
May  1 08:23:49 santamaria sshd\[30886\]: Failed password for root from 80.211.78.82 port 51260 ssh2
May  1 08:27:45 santamaria sshd\[30918\]: Invalid user james from 80.211.78.82
May  1 08:27:45 santamaria sshd\[30918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.78.82
...
2020-05-01 15:17:43
122.51.79.83 attackspambots
Invalid user ja from 122.51.79.83 port 52104
2020-05-01 15:06:11
200.73.128.100 attackspam
Invalid user updater from 200.73.128.100 port 57702
2020-05-01 14:52:03
170.244.232.90 attackspambots
May  1 08:11:44 roki-contabo sshd\[9672\]: Invalid user temp from 170.244.232.90
May  1 08:11:44 roki-contabo sshd\[9672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.244.232.90
May  1 08:11:46 roki-contabo sshd\[9672\]: Failed password for invalid user temp from 170.244.232.90 port 48562 ssh2
May  1 08:15:46 roki-contabo sshd\[9694\]: Invalid user danb from 170.244.232.90
May  1 08:15:46 roki-contabo sshd\[9694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.244.232.90
...
2020-05-01 14:57:31
167.114.185.237 attack
Invalid user cookie from 167.114.185.237 port 49020
2020-05-01 14:58:21
128.199.81.42 attack
Invalid user patrol from 128.199.81.42 port 58900
2020-05-01 15:04:43
165.227.47.96 attack
Invalid user cosmo from 165.227.47.96 port 40880
2020-05-01 14:59:10
115.231.231.3 attackspambots
Tried sshing with brute force.
2020-05-01 15:08:11
87.156.132.86 attackspambots
Invalid user zeng from 87.156.132.86 port 39430
2020-05-01 15:17:15
5.135.158.228 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-05-01 15:30:02
222.186.173.183 attack
fail2ban -- 222.186.173.183
...
2020-05-01 15:31:11
58.11.86.213 normal
...
2020-05-01 15:13:25
193.70.42.33 attackspambots
May  1 03:37:53 firewall sshd[17333]: Invalid user vs from 193.70.42.33
May  1 03:37:55 firewall sshd[17333]: Failed password for invalid user vs from 193.70.42.33 port 47160 ssh2
May  1 03:41:20 firewall sshd[17411]: Invalid user admin from 193.70.42.33
...
2020-05-01 14:52:45
46.26.118.12 attack
Invalid user mshan from 46.26.118.12 port 40464
2020-05-01 15:26:13
139.59.58.115 attackspam
srv02 Mass scanning activity detected Target: 12825  ..
2020-05-01 15:03:35

Recently Reported IPs

1.4.245.38 1.4.245.73 1.4.245.8 1.4.246.163
1.4.246.164 1.4.246.177 1.4.246.188 28.21.51.0
1.4.246.196 1.4.246.198 1.4.246.20 1.4.246.218
1.4.246.24 1.4.246.245 1.4.246.33 1.4.246.59
1.4.246.82 1.4.246.87 1.4.246.88 1.4.246.94