Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.243.53.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28919
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.243.53.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120700 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 07 18:36:10 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 34.53.243.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.53.243.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.76.98.71 attack
Jan  9 23:27:13 MK-Soft-VM8 sshd[7201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.98.71 
Jan  9 23:27:15 MK-Soft-VM8 sshd[7201]: Failed password for invalid user 5555555 from 180.76.98.71 port 33390 ssh2
...
2020-01-10 06:41:09
68.183.238.151 attackbotsspam
Jan  6 01:25:56 ghostname-secure sshd[24920]: Failed password for invalid user el from 68.183.238.151 port 37126 ssh2
Jan  6 01:25:56 ghostname-secure sshd[24920]: Received disconnect from 68.183.238.151: 11: Bye Bye [preauth]
Jan  6 01:33:22 ghostname-secure sshd[25096]: Failed password for invalid user slq from 68.183.238.151 port 57426 ssh2
Jan  6 01:33:22 ghostname-secure sshd[25096]: Received disconnect from 68.183.238.151: 11: Bye Bye [preauth]
Jan  6 01:36:07 ghostname-secure sshd[25185]: Failed password for invalid user rda from 68.183.238.151 port 53904 ssh2
Jan  6 01:36:07 ghostname-secure sshd[25185]: Received disconnect from 68.183.238.151: 11: Bye Bye [preauth]
Jan  6 01:38:41 ghostname-secure sshd[25222]: Failed password for invalid user qk from 68.183.238.151 port 50296 ssh2
Jan  6 01:38:41 ghostname-secure sshd[25222]: Received disconnect from 68.183.238.151: 11: Bye Bye [preauth]
Jan  6 01:41:25 ghostname-secure sshd[25400]: Failed password for invalid ........
-------------------------------
2020-01-10 06:12:26
187.162.51.63 attackspam
Jan  9 20:57:10 ws26vmsma01 sshd[181877]: Failed password for root from 187.162.51.63 port 59024 ssh2
...
2020-01-10 06:15:13
106.53.110.176 attackbots
smtp probe/invalid login attempt
2020-01-10 06:34:06
112.85.42.180 attackbotsspam
Jan  9 23:17:26 jane sshd[17388]: Failed password for root from 112.85.42.180 port 21202 ssh2
Jan  9 23:17:29 jane sshd[17388]: Failed password for root from 112.85.42.180 port 21202 ssh2
...
2020-01-10 06:20:01
83.28.189.166 attackspam
Jan  9 23:27:50 MK-Soft-VM8 sshd[7212]: Failed password for root from 83.28.189.166 port 54930 ssh2
...
2020-01-10 06:35:56
81.22.45.148 attack
2020-01-09T22:26:18.998753+01:00 lumpi kernel: [3895075.572880] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=59410 PROTO=TCP SPT=56004 DPT=3432 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-01-10 06:09:50
114.231.41.162 attackspam
2020-01-09 15:25:13 dovecot_login authenticator failed for (jumrh) [114.231.41.162]:54627 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=liuna@lerctr.org)
2020-01-09 15:25:20 dovecot_login authenticator failed for (camlq) [114.231.41.162]:54627 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=liuna@lerctr.org)
2020-01-09 15:25:31 dovecot_login authenticator failed for (ykbrt) [114.231.41.162]:54627 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=liuna@lerctr.org)
...
2020-01-10 06:37:44
79.143.31.34 attackbotsspam
Jan  9 21:45:11 hgb10301 sshd[23857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.31.34  user=r.r
Jan  9 21:45:13 hgb10301 sshd[23857]: Failed password for r.r from 79.143.31.34 port 49762 ssh2
Jan  9 21:45:13 hgb10301 sshd[23857]: Received disconnect from 79.143.31.34 port 49762:11: Bye Bye [preauth]
Jan  9 21:45:13 hgb10301 sshd[23857]: Disconnected from 79.143.31.34 port 49762 [preauth]
Jan  9 21:51:24 hgb10301 sshd[24116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.31.34  user=r.r
Jan  9 21:51:27 hgb10301 sshd[24116]: Failed password for r.r from 79.143.31.34 port 42826 ssh2
Jan  9 21:51:27 hgb10301 sshd[24116]: Received disconnect from 79.143.31.34 port 42826:11: Bye Bye [preauth]
Jan  9 21:51:27 hgb10301 sshd[24116]: Disconnected from 79.143.31.34 port 42826 [preauth]
Jan  9 21:53:21 hgb10301 sshd[24214]: pam_unix(sshd:auth): authentication failure; logname= uid=........
-------------------------------
2020-01-10 06:07:42
222.186.175.220 attackbotsspam
Jan  9 23:10:53 localhost sshd\[3337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
Jan  9 23:10:56 localhost sshd\[3337\]: Failed password for root from 222.186.175.220 port 50590 ssh2
Jan  9 23:10:58 localhost sshd\[3337\]: Failed password for root from 222.186.175.220 port 50590 ssh2
2020-01-10 06:17:46
218.92.0.164 attack
Jan  9 23:11:16 icinga sshd[15262]: Failed password for root from 218.92.0.164 port 11289 ssh2
Jan  9 23:11:29 icinga sshd[15262]: error: maximum authentication attempts exceeded for root from 218.92.0.164 port 11289 ssh2 [preauth]
...
2020-01-10 06:11:57
89.109.23.190 attack
$f2bV_matches
2020-01-10 06:07:19
187.178.173.161 attack
Jan  9 22:26:05 mout sshd[4615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.178.173.161  user=root
Jan  9 22:26:07 mout sshd[4615]: Failed password for root from 187.178.173.161 port 41815 ssh2
2020-01-10 06:14:50
142.93.26.245 attackspambots
Jan  9 22:23:49 SilenceServices sshd[13735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Jan  9 22:23:51 SilenceServices sshd[13735]: Failed password for invalid user men from 142.93.26.245 port 44824 ssh2
Jan  9 22:25:55 SilenceServices sshd[15398]: Failed password for mysql from 142.93.26.245 port 38082 ssh2
2020-01-10 06:21:36
18.218.207.108 attack
Spam
2020-01-10 06:30:04

Recently Reported IPs

251.137.111.120 161.15.139.51 35.250.240.121 44.38.89.229
100.60.193.70 244.164.21.116 67.117.199.110 168.95.105.198
22.237.166.105 64.225.64.216 214.10.38.140 171.157.185.149
154.221.72.174 80.15.178.245 231.189.44.255 252.32.203.232
220.78.162.227 233.137.194.140 46.10.192.35 249.2.56.135