Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 254.57.109.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42252
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;254.57.109.45.			IN	A

;; AUTHORITY SECTION:
.			584	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022060901 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 10 04:33:05 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 45.109.57.254.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.109.57.254.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
73.244.10.110 attackbotsspam
Aug  5 16:58:40 pkdns2 sshd\[16224\]: Invalid user administrator from 73.244.10.110Aug  5 16:58:42 pkdns2 sshd\[16224\]: Failed password for invalid user administrator from 73.244.10.110 port 42308 ssh2Aug  5 16:58:44 pkdns2 sshd\[16226\]: Invalid user db2as from 73.244.10.110Aug  5 16:58:47 pkdns2 sshd\[16226\]: Failed password for invalid user db2as from 73.244.10.110 port 42335 ssh2Aug  5 16:58:50 pkdns2 sshd\[16228\]: Invalid user Basisk from 73.244.10.110Aug  5 16:58:51 pkdns2 sshd\[16228\]: Failed password for invalid user Basisk from 73.244.10.110 port 42353 ssh2
...
2020-08-06 04:15:34
37.139.16.229 attackspambots
web-1 [ssh] SSH Attack
2020-08-06 04:37:23
74.82.47.20 attack
 TCP (SYN) 74.82.47.20:49768 -> port 11211, len 44
2020-08-06 04:01:46
207.244.92.6 attackspambots
08/05/2020-16:00:33.975475 207.244.92.6 Protocol: 17 ET SCAN Sipvicious Scan
2020-08-06 04:07:57
216.218.206.79 attackbots
 TCP (SYN) 216.218.206.79:45343 -> port 548, len 40
2020-08-06 04:22:54
69.174.91.40 attack
fell into ViewStateTrap:paris
2020-08-06 04:23:16
185.175.93.14 attack
Attempted to establish connection to non opened port 53694
2020-08-06 04:10:56
103.76.175.130 attackspam
2020-08-05T04:51:03.892253hostname sshd[119270]: Failed password for root from 103.76.175.130 port 33890 ssh2
...
2020-08-06 04:07:28
139.59.59.75 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-08-06 03:59:34
222.186.42.7 attack
Aug  5 15:55:27 NPSTNNYC01T sshd[16802]: Failed password for root from 222.186.42.7 port 12350 ssh2
Aug  5 15:55:41 NPSTNNYC01T sshd[16828]: Failed password for root from 222.186.42.7 port 51984 ssh2
...
2020-08-06 03:58:31
94.102.51.77 attackspam
Attempted to establish connection to non opened port 8805
2020-08-06 04:30:53
117.2.136.234 attackspambots
20 attempts against mh-misbehave-ban on pluto
2020-08-06 04:07:04
179.108.240.194 attackspam
$f2bV_matches
2020-08-06 04:35:45
14.121.147.76 attackbots
Port probing on unauthorized port 1433
2020-08-06 04:21:37
5.232.116.115 attack
20/8/5@08:10:16: FAIL: Alarm-Network address from=5.232.116.115
20/8/5@08:10:16: FAIL: Alarm-Network address from=5.232.116.115
...
2020-08-06 04:25:27

Recently Reported IPs

108.160.145.233 2.106.204.165 60.50.157.46 3.180.85.86
10.139.97.46 238.13.208.12 31.25.249.187 106.193.50.177
235.137.250.185 193.146.11.108 163.173.240.171 178.198.253.152
121.107.148.16 219.100.88.174 212.61.99.230 142.4.193.53
188.56.159.144 186.75.210.38 8.97.162.108 145.239.41.127