Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.241.28.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43482
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.241.28.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030600 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 02:06:29 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 53.28.241.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.28.241.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
204.156.180.113 attack
2020-06-20T20:01:23+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-06-21 02:48:28
195.54.160.135 attackspambots
Unauthorized connection attempt detected from IP address 195.54.160.135 to port 6379
2020-06-21 02:14:11
188.16.146.220 attack
firewall-block, port(s): 8080/tcp
2020-06-21 02:39:48
222.186.180.147 attackbots
Jun 20 20:27:22 ns3164893 sshd[5376]: Failed password for root from 222.186.180.147 port 57888 ssh2
Jun 20 20:27:25 ns3164893 sshd[5376]: Failed password for root from 222.186.180.147 port 57888 ssh2
...
2020-06-21 02:29:50
118.99.104.141 attack
Jun 20 18:37:16 django-0 sshd[17711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.99.104.141  user=root
Jun 20 18:37:18 django-0 sshd[17711]: Failed password for root from 118.99.104.141 port 43186 ssh2
...
2020-06-21 02:40:26
222.186.30.167 attackspambots
2020-06-20T20:43:52.781471sd-86998 sshd[44001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167  user=root
2020-06-20T20:43:54.461149sd-86998 sshd[44001]: Failed password for root from 222.186.30.167 port 47187 ssh2
2020-06-20T20:43:56.735428sd-86998 sshd[44001]: Failed password for root from 222.186.30.167 port 47187 ssh2
2020-06-20T20:43:52.781471sd-86998 sshd[44001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167  user=root
2020-06-20T20:43:54.461149sd-86998 sshd[44001]: Failed password for root from 222.186.30.167 port 47187 ssh2
2020-06-20T20:43:56.735428sd-86998 sshd[44001]: Failed password for root from 222.186.30.167 port 47187 ssh2
2020-06-20T20:43:52.781471sd-86998 sshd[44001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167  user=root
2020-06-20T20:43:54.461149sd-86998 sshd[44001]: Failed password for root from 
...
2020-06-21 02:44:38
185.234.219.226 attack
$f2bV_matches
2020-06-21 02:20:26
78.162.33.47 attackbotsspam
Automatic report - Port Scan Attack
2020-06-21 02:14:44
1.34.13.221 attack
TW_MAINT-TW-TWNIC_<177>1592675435 [1:2403302:58145] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 2 [Classification: Misc Attack] [Priority: 2]:  {TCP} 1.34.13.221:22548
2020-06-21 02:20:07
58.250.164.246 attack
Jun 20 21:27:14 journals sshd\[43649\]: Invalid user amol from 58.250.164.246
Jun 20 21:27:14 journals sshd\[43649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.250.164.246
Jun 20 21:27:16 journals sshd\[43649\]: Failed password for invalid user amol from 58.250.164.246 port 38817 ssh2
Jun 20 21:31:49 journals sshd\[44312\]: Invalid user imj from 58.250.164.246
Jun 20 21:31:49 journals sshd\[44312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.250.164.246
...
2020-06-21 02:49:26
123.58.251.38 attackbotsspam
Jun 20 18:17:59 vps1 sshd[1774267]: Failed password for root from 123.58.251.38 port 58488 ssh2
Jun 20 18:20:38 vps1 sshd[1774328]: Invalid user dmr from 123.58.251.38 port 38846
...
2020-06-21 02:27:51
162.243.138.34 attackspambots
firewall-block, port(s): 2379/tcp
2020-06-21 02:45:54
61.177.172.142 attack
Jun 20 20:45:53 server sshd[9571]: Failed none for root from 61.177.172.142 port 5168 ssh2
Jun 20 20:45:54 server sshd[9571]: Failed password for root from 61.177.172.142 port 5168 ssh2
Jun 20 20:45:58 server sshd[9571]: Failed password for root from 61.177.172.142 port 5168 ssh2
2020-06-21 02:46:45
96.127.179.156 attackbots
SSH Brute-Force attacks
2020-06-21 02:49:15
36.255.222.44 attackbots
$f2bV_matches
2020-06-21 02:42:57

Recently Reported IPs

76.141.76.9 73.194.180.219 49.87.205.30 233.218.226.190
27.222.234.129 211.87.134.76 207.136.155.231 218.234.53.150
224.66.122.229 13.100.158.113 8.209.80.245 9.4.229.170
72.175.253.247 234.41.215.53 122.236.174.122 18.76.81.203
190.99.86.116 244.239.252.179 151.141.1.36 241.172.18.111