Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.45.32.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48526
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;201.45.32.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 00:22:04 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 54.32.45.201.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.32.45.201.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.68.168.4 attackspambots
k+ssh-bruteforce
2019-11-02 15:38:02
138.197.175.236 attack
Nov  2 08:15:14 MainVPS sshd[27013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.175.236  user=root
Nov  2 08:15:15 MainVPS sshd[27013]: Failed password for root from 138.197.175.236 port 49328 ssh2
Nov  2 08:22:29 MainVPS sshd[27510]: Invalid user Silva from 138.197.175.236 port 51986
Nov  2 08:22:29 MainVPS sshd[27510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.175.236
Nov  2 08:22:29 MainVPS sshd[27510]: Invalid user Silva from 138.197.175.236 port 51986
Nov  2 08:22:31 MainVPS sshd[27510]: Failed password for invalid user Silva from 138.197.175.236 port 51986 ssh2
...
2019-11-02 15:26:21
185.173.35.57 attack
Metasploit VxWorks WDB Agent Scanner Detection
2019-11-02 15:21:54
157.230.92.254 attack
Banned for posting to wp-login.php without referer {"log":"agent-326245","pwd":"","wp-submit":"Log In","redirect_to":"http:\/\/maryrouleau.com\/wp-admin\/","testcookie":"1"}
2019-11-02 15:42:34
195.154.27.239 attackspambots
Nov  1 20:35:24 hanapaa sshd\[11225\]: Invalid user oracle from 195.154.27.239
Nov  1 20:35:24 hanapaa sshd\[11225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.27.239
Nov  1 20:35:26 hanapaa sshd\[11225\]: Failed password for invalid user oracle from 195.154.27.239 port 39207 ssh2
Nov  1 20:39:16 hanapaa sshd\[11653\]: Invalid user g1 from 195.154.27.239
Nov  1 20:39:16 hanapaa sshd\[11653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.27.239
2019-11-02 15:29:45
181.48.29.35 attackbotsspam
Fail2Ban - SSH Bruteforce Attempt
2019-11-02 15:48:09
200.194.28.116 attackbots
Nov  2 08:50:40 MK-Soft-VM4 sshd[3827]: Failed password for root from 200.194.28.116 port 40772 ssh2
Nov  2 08:50:48 MK-Soft-VM4 sshd[3827]: Failed password for root from 200.194.28.116 port 40772 ssh2
...
2019-11-02 15:52:43
95.210.45.30 attack
Nov  1 21:35:08 tdfoods sshd\[24711\]: Invalid user Motdepasse@1 from 95.210.45.30
Nov  1 21:35:08 tdfoods sshd\[24711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95-210-45-30.ip.skylogicnet.com
Nov  1 21:35:10 tdfoods sshd\[24711\]: Failed password for invalid user Motdepasse@1 from 95.210.45.30 port 22557 ssh2
Nov  1 21:41:35 tdfoods sshd\[25315\]: Invalid user wangxiuying from 95.210.45.30
Nov  1 21:41:35 tdfoods sshd\[25315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95-210-45-30.ip.skylogicnet.com
2019-11-02 15:43:33
69.90.184.209 attackspambots
19/11/1@23:49:20: FAIL: Alarm-Intrusion address from=69.90.184.209
...
2019-11-02 15:52:17
94.191.20.179 attack
2019-11-02T07:06:21.591418abusebot-5.cloudsearch.cf sshd\[21505\]: Invalid user webmaster from 94.191.20.179 port 49820
2019-11-02 15:15:40
45.67.15.140 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 33 - port: 22 proto: TCP cat: Misc Attack
2019-11-02 15:16:03
60.182.177.255 attackbots
$f2bV_matches
2019-11-02 15:54:21
202.75.62.168 attack
wp bruteforce
2019-11-02 15:50:45
107.179.95.9 attackbotsspam
Nov  2 08:58:33 server sshd\[1993\]: User root from 107.179.95.9 not allowed because listed in DenyUsers
Nov  2 08:58:33 server sshd\[1993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.179.95.9  user=root
Nov  2 08:58:36 server sshd\[1993\]: Failed password for invalid user root from 107.179.95.9 port 50439 ssh2
Nov  2 09:07:05 server sshd\[8538\]: User root from 107.179.95.9 not allowed because listed in DenyUsers
Nov  2 09:07:05 server sshd\[8538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.179.95.9  user=root
2019-11-02 15:31:49
132.232.226.95 attackbots
Automatic report - Banned IP Access
2019-11-02 15:55:21

Recently Reported IPs

179.34.75.174 221.131.196.26 217.87.22.23 56.8.170.23
58.189.234.231 124.227.230.213 243.144.20.196 220.252.160.170
91.36.3.2 129.158.168.131 54.234.87.138 21.151.31.94
245.12.34.228 101.182.100.249 16.24.237.174 74.124.251.71
25.163.43.107 251.13.67.176 191.38.165.239 94.80.255.198