Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 254.45.113.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8504
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;254.45.113.20.			IN	A

;; AUTHORITY SECTION:
.			545	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023022700 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 27 17:29:53 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 20.113.45.254.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.113.45.254.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
171.224.94.101 attackbots
1579841481 - 01/24/2020 05:51:21 Host: 171.224.94.101/171.224.94.101 Port: 445 TCP Blocked
2020-01-24 20:20:56
49.88.112.75 attackbots
(sshd) Failed SSH login from 49.88.112.75 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan 24 11:55:23 ubnt-55d23 sshd[21399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.75  user=root
Jan 24 11:55:25 ubnt-55d23 sshd[21399]: Failed password for root from 49.88.112.75 port 31962 ssh2
2020-01-24 20:07:22
157.245.203.50 attackbotsspam
Unauthorized connection attempt detected from IP address 157.245.203.50 to port 2220 [J]
2020-01-24 20:07:58
129.211.124.29 attackspam
Invalid user jared from 129.211.124.29 port 57428
2020-01-24 20:26:16
31.129.70.189 attack
Unauthorized connection attempt detected from IP address 31.129.70.189 to port 8081 [J]
2020-01-24 20:10:16
106.12.34.56 attack
Unauthorized connection attempt detected from IP address 106.12.34.56 to port 2220 [J]
2020-01-24 20:22:32
178.220.111.92 attackspambots
Automatic report - Port Scan Attack
2020-01-24 20:11:16
106.54.219.195 attackbots
Unauthorized connection attempt detected from IP address 106.54.219.195 to port 2220 [J]
2020-01-24 20:02:00
2.191.128.211 attack
port scan and connect, tcp 80 (http)
2020-01-24 20:30:54
37.21.197.114 attackspam
Jan 24 13:39:28 grey postfix/smtpd\[4180\]: NOQUEUE: reject: RCPT from unknown\[37.21.197.114\]: 554 5.7.1 Service unavailable\; Client host \[37.21.197.114\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?37.21.197.114\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-24 20:44:15
222.186.15.10 attackbots
Unauthorized connection attempt detected from IP address 222.186.15.10 to port 22 [J]
2020-01-24 20:49:19
159.65.77.254 attackbotsspam
Unauthorized connection attempt detected from IP address 159.65.77.254 to port 2220 [J]
2020-01-24 20:05:17
94.23.255.92 attackbots
Jan 24 13:39:26 debian-2gb-nbg1-2 kernel: \[2128842.671946\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.23.255.92 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=61311 DF PROTO=TCP SPT=61084 DPT=3389 WINDOW=64240 RES=0x00 SYN URGP=0
2020-01-24 20:45:16
60.172.95.182 attackbots
Unauthorized connection attempt detected from IP address 60.172.95.182 to port 22 [J]
2020-01-24 20:41:22
105.112.91.147 attack
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-01-24 20:46:49

Recently Reported IPs

23.114.160.14 117.157.6.168 117.157.148.105 198.199.95.14
117.77.144.111 5.28.148.244 108.62.187.54 128.5.15.31
4.184.237.208 52.244.106.201 157.189.79.218 194.3.132.66
198.98.255.62 1.254.244.147 106.171.75.2 161.129.234.34
106.111.22.62 172.242.9.233 186.67.67.186 74.42.30.228