Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: GRZ IT Center GmbH

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.228.20.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56549
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;193.228.20.45.			IN	A

;; AUTHORITY SECTION:
.			1866	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060200 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 02 22:31:28 CST 2019
;; MSG SIZE  rcvd: 117

Host info
Host 45.20.228.193.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.20.228.193.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
104.131.93.33 attackbotsspam
Invalid user user from 104.131.93.33 port 58505
2019-06-30 13:27:41
88.248.15.4 attackbotsspam
23/tcp
[2019-06-30]1pkt
2019-06-30 13:22:35
185.36.81.169 attackbotsspam
Jun 29 18:25:02 cac1d2 postfix/smtpd\[8243\]: warning: unknown\[185.36.81.169\]: SASL LOGIN authentication failed: authentication failure
Jun 29 19:34:34 cac1d2 postfix/smtpd\[17768\]: warning: unknown\[185.36.81.169\]: SASL LOGIN authentication failed: authentication failure
Jun 29 20:44:08 cac1d2 postfix/smtpd\[26208\]: warning: unknown\[185.36.81.169\]: SASL LOGIN authentication failed: authentication failure
...
2019-06-30 13:55:21
46.97.21.146 attackspam
23/tcp
[2019-06-30]1pkt
2019-06-30 14:09:20
182.155.86.157 attackbots
445/tcp
[2019-06-30]1pkt
2019-06-30 14:02:24
168.228.148.171 attackspam
SMTP-sasl brute force
...
2019-06-30 14:12:43
175.166.85.113 attackspam
23/tcp
[2019-06-30]1pkt
2019-06-30 14:15:24
61.224.137.19 attackbotsspam
37215/tcp
[2019-06-30]1pkt
2019-06-30 13:51:43
88.174.4.30 attackspam
Jun 30 05:44:40 bouncer sshd\[8850\]: Invalid user pi from 88.174.4.30 port 39948
Jun 30 05:44:40 bouncer sshd\[8848\]: Invalid user pi from 88.174.4.30 port 39946
Jun 30 05:44:40 bouncer sshd\[8850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.174.4.30 
...
2019-06-30 13:40:46
49.67.71.158 attackbots
2019-06-29T18:13:13.195335 X postfix/smtpd[3477]: warning: unknown[49.67.71.158]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-29T21:25:51.409580 X postfix/smtpd[33128]: warning: unknown[49.67.71.158]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-30T05:44:13.359409 X postfix/smtpd[49826]: warning: unknown[49.67.71.158]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-30 13:52:06
116.115.202.114 attackbotsspam
23/tcp
[2019-06-30]1pkt
2019-06-30 13:20:20
46.69.181.54 attackbots
23/tcp
[2019-06-30]1pkt
2019-06-30 13:25:38
49.67.67.170 attack
2019-06-30T02:36:39.466115 X postfix/smtpd[15220]: warning: unknown[49.67.67.170]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-30T05:42:50.238299 X postfix/smtpd[41013]: warning: unknown[49.67.67.170]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-30T05:44:28.282418 X postfix/smtpd[47141]: warning: unknown[49.67.67.170]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-30 13:48:21
123.115.52.76 attack
Jun 30 06:02:14 MainVPS sshd[30006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.115.52.76  user=root
Jun 30 06:02:17 MainVPS sshd[30006]: Failed password for root from 123.115.52.76 port 56962 ssh2
Jun 30 06:06:50 MainVPS sshd[30345]: Invalid user admin from 123.115.52.76 port 39496
Jun 30 06:06:50 MainVPS sshd[30345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.115.52.76
Jun 30 06:06:50 MainVPS sshd[30345]: Invalid user admin from 123.115.52.76 port 39496
Jun 30 06:06:52 MainVPS sshd[30345]: Failed password for invalid user admin from 123.115.52.76 port 39496 ssh2
...
2019-06-30 14:03:25
191.53.197.88 attackspam
SMTP-sasl brute force
...
2019-06-30 14:01:53

Recently Reported IPs

37.238.117.8 121.11.54.252 60.229.237.156 82.197.9.54
70.113.46.94 114.235.52.185 108.81.182.56 44.16.159.53
156.227.165.31 89.40.50.132 84.60.137.122 122.214.199.246
60.93.19.251 210.232.192.73 249.27.198.199 131.184.163.120
117.4.145.16 182.75.150.169 109.92.201.251 45.63.4.121