Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dublin

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.45.196.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54152
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.45.196.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 11:27:06 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 53.196.45.137.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.82.98, trying next server
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.196.45.137.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.139 attack
Aug 14 02:03:53 SilenceServices sshd[8607]: Failed password for root from 218.92.0.139 port 64769 ssh2
Aug 14 02:04:02 SilenceServices sshd[8607]: Failed password for root from 218.92.0.139 port 64769 ssh2
Aug 14 02:04:06 SilenceServices sshd[8607]: error: maximum authentication attempts exceeded for root from 218.92.0.139 port 64769 ssh2 [preauth]
2019-08-14 09:15:51
185.36.81.173 attackbots
Rude login attack (24 tries in 1d)
2019-08-14 09:27:32
200.207.220.128 attack
2019-08-14T01:09:33.171313abusebot-8.cloudsearch.cf sshd\[6291\]: Invalid user andre from 200.207.220.128 port 57175
2019-08-14 09:20:02
139.227.112.211 attack
$f2bV_matches
2019-08-14 09:25:21
36.67.226.223 attackbots
Aug 13 21:06:39 XXX sshd[11553]: Invalid user abt from 36.67.226.223 port 41268
2019-08-14 09:53:47
110.10.189.64 attackspambots
Fail2Ban Ban Triggered
2019-08-14 09:41:55
174.49.159.222 attack
Forbidden directory scan :: 2019/08/14 07:46:04 [error] 1094#1094: *168383 access forbidden by rule, client: 174.49.159.222, server: [censored_4], request: "GET /Logins.sql HTTP/1.1", host: "[censored_4]", referrer: "http://[censored_4]/Logins.sql"
2019-08-14 09:17:39
186.4.224.171 attackbots
Aug 14 00:43:14 XXX sshd[22229]: Invalid user git from 186.4.224.171 port 56394
2019-08-14 09:29:09
5.39.37.10 attackspambots
attempted to connect via port 9000 August 12th, 9:00 am Eastern Time Zone
2019-08-14 09:51:05
110.44.123.47 attackbots
Automatic report - Banned IP Access
2019-08-14 09:44:42
151.80.36.188 attack
(sshd) Failed SSH login from 151.80.36.188 (ns3006809.ip-151-80-36.eu): 5 in the last 3600 secs
2019-08-14 09:17:54
198.50.161.20 attack
Aug 14 00:38:43 microserver sshd[33018]: Invalid user paulj from 198.50.161.20 port 40560
Aug 14 00:38:43 microserver sshd[33018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.161.20
Aug 14 00:38:45 microserver sshd[33018]: Failed password for invalid user paulj from 198.50.161.20 port 40560 ssh2
Aug 14 00:43:28 microserver sshd[33703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.161.20  user=root
Aug 14 00:43:30 microserver sshd[33703]: Failed password for root from 198.50.161.20 port 34472 ssh2
Aug 14 00:57:26 microserver sshd[35783]: Invalid user sandy from 198.50.161.20 port 44420
Aug 14 00:57:26 microserver sshd[35783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.161.20
Aug 14 00:57:27 microserver sshd[35783]: Failed password for invalid user sandy from 198.50.161.20 port 44420 ssh2
Aug 14 01:02:09 microserver sshd[36508]: Invalid user karla from 198.50.1
2019-08-14 09:40:04
27.254.136.29 attackbots
Aug 14 02:06:22 XXX sshd[26437]: Invalid user lehranstalt from 27.254.136.29 port 59844
2019-08-14 09:40:33
222.128.92.103 attack
Invalid user support from 222.128.92.103 port 38776
2019-08-14 09:47:07
198.12.80.230 attackbots
Spam
2019-08-14 09:34:17

Recently Reported IPs

71.93.124.85 45.138.222.26 207.33.138.146 159.21.194.229
21.235.27.32 2.190.119.27 181.186.102.63 72.48.167.32
140.182.41.176 217.136.253.103 94.98.113.113 149.26.156.23
144.148.2.6 243.219.28.112 167.163.75.220 196.210.173.215
221.25.62.189 204.83.67.120 55.1.114.69 89.68.133.61