Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.195.45.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19120
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.195.45.53.			IN	A

;; AUTHORITY SECTION:
.			118	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 10:49:53 CST 2022
;; MSG SIZE  rcvd: 106
Host info
53.45.195.113.in-addr.arpa domain name pointer 53.45.195.113.adsl-pool.jx.chinaunicom.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.45.195.113.in-addr.arpa	name = 53.45.195.113.adsl-pool.jx.chinaunicom.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
144.76.108.38 attackbots
Dictionary attack on login resource.
2019-07-22 20:52:15
198.54.113.3 attackbotsspam
michaelklotzbier.de 198.54.113.3 \[22/Jul/2019:05:19:34 +0200\] "POST /wp-login.php HTTP/1.1" 200 5838 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
michaelklotzbier.de 198.54.113.3 \[22/Jul/2019:05:19:36 +0200\] "POST /wp-login.php HTTP/1.1" 200 5795 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-22 20:45:37
113.181.151.169 attack
Unauthorized connection attempt from IP address 113.181.151.169 on Port 445(SMB)
2019-07-22 20:30:36
189.254.33.157 attackspam
Invalid user hadoop from 189.254.33.157 port 46947
2019-07-22 20:42:21
184.105.139.88 attack
scan z
2019-07-22 20:56:16
24.221.19.31 attackbotsspam
Jul 22 03:28:58 db sshd\[31109\]: Invalid user pi from 24.221.19.31
Jul 22 03:28:58 db sshd\[31108\]: Invalid user pi from 24.221.19.31
Jul 22 03:28:59 db sshd\[31109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-24-221-19-31.atlnga.spcsdns.net 
Jul 22 03:28:59 db sshd\[31108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-24-221-19-31.atlnga.spcsdns.net 
Jul 22 03:29:01 db sshd\[31108\]: Failed password for invalid user pi from 24.221.19.31 port 52758 ssh2
...
2019-07-22 20:51:07
145.239.89.243 attack
Jul 22 12:57:41 mail sshd\[3938\]: Invalid user jerome from 145.239.89.243 port 54430
Jul 22 12:57:41 mail sshd\[3938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.89.243
...
2019-07-22 20:12:16
51.83.32.88 attackspam
Jul 22 06:05:37 nextcloud sshd\[32231\]: Invalid user vel from 51.83.32.88
Jul 22 06:05:37 nextcloud sshd\[32231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.32.88
Jul 22 06:05:38 nextcloud sshd\[32231\]: Failed password for invalid user vel from 51.83.32.88 port 34762 ssh2
...
2019-07-22 20:32:13
113.190.240.166 attack
Unauthorized connection attempt from IP address 113.190.240.166 on Port 445(SMB)
2019-07-22 20:08:53
51.254.210.53 attackspambots
Jul 22 11:05:38 marvibiene sshd[3351]: Invalid user squadserver from 51.254.210.53 port 41472
Jul 22 11:05:38 marvibiene sshd[3351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.210.53
Jul 22 11:05:38 marvibiene sshd[3351]: Invalid user squadserver from 51.254.210.53 port 41472
Jul 22 11:05:40 marvibiene sshd[3351]: Failed password for invalid user squadserver from 51.254.210.53 port 41472 ssh2
...
2019-07-22 20:43:54
177.101.255.26 attack
2019-07-22T11:58:27.854789abusebot-4.cloudsearch.cf sshd\[28182\]: Invalid user fcweb from 177.101.255.26 port 57165
2019-07-22 20:17:37
179.106.102.63 attackbots
port scan and connect, tcp 80 (http)
2019-07-22 20:44:27
78.232.145.24 attack
SSH Brute Force, server-1 sshd[23363]: Failed password for root from 78.232.145.24 port 47818 ssh2
2019-07-22 20:49:38
190.85.143.32 attackspambots
Unauthorized connection attempt from IP address 190.85.143.32 on Port 445(SMB)
2019-07-22 20:27:09
45.55.88.94 attackspam
Jul 22 13:21:24 microserver sshd[30958]: Invalid user god from 45.55.88.94 port 48037
Jul 22 13:21:24 microserver sshd[30958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.94
Jul 22 13:21:26 microserver sshd[30958]: Failed password for invalid user god from 45.55.88.94 port 48037 ssh2
Jul 22 13:28:31 microserver sshd[31706]: Invalid user unseen from 45.55.88.94 port 46494
Jul 22 13:28:31 microserver sshd[31706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.94
Jul 22 13:42:42 microserver sshd[33640]: Invalid user ik from 45.55.88.94 port 43408
Jul 22 13:42:42 microserver sshd[33640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.94
Jul 22 13:42:44 microserver sshd[33640]: Failed password for invalid user ik from 45.55.88.94 port 43408 ssh2
Jul 22 13:49:52 microserver sshd[34370]: Invalid user tester from 45.55.88.94 port 41867
Jul 22 13:49:52 microserver ssh
2019-07-22 20:46:32

Recently Reported IPs

113.195.45.30 113.195.55.58 113.195.57.209 113.53.106.85
113.195.55.65 113.195.59.252 113.195.55.79 113.53.106.94
113.195.45.55 113.53.112.167 113.53.112.39 113.206.133.51
113.206.133.40 113.206.134.201 113.206.134.90 113.206.134.165
113.206.135.122 113.206.135.229 113.206.135.17 113.206.17.85