Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.197.56.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61381
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.197.56.52.			IN	A

;; AUTHORITY SECTION:
.			403	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070301 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 04 08:32:26 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 52.56.197.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.56.197.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
92.53.65.196 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 93 - port: 7005 proto: TCP cat: Misc Attack
2019-10-27 07:18:17
89.248.174.193 attack
" "
2019-10-27 07:20:33
45.67.15.137 attackspam
Oct 27 01:04:26 www sshd\[26673\]: Invalid user ubnt from 45.67.15.137Oct 27 01:04:28 www sshd\[26673\]: Failed password for invalid user ubnt from 45.67.15.137 port 11945 ssh2Oct 27 01:04:30 www sshd\[26675\]: Failed password for root from 45.67.15.137 port 16183 ssh2
...
2019-10-27 06:56:30
159.203.201.210 attackspam
Port scan: Attack repeated for 24 hours
2019-10-27 07:10:48
198.108.67.46 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 1025 proto: TCP cat: Misc Attack
2019-10-27 07:00:41
168.232.197.4 attackspambots
ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak
2019-10-27 07:10:08
94.102.51.108 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 95 - port: 3389 proto: TCP cat: Misc Attack
2019-10-27 07:15:29
89.248.162.167 attackspam
10/26/2019-17:24:56.792750 89.248.162.167 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 98
2019-10-27 07:21:12
185.216.140.6 attackbots
10/26/2019-17:04:58.504769 185.216.140.6 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-27 07:03:33
92.53.65.164 attack
firewall-block, port(s): 6007/tcp
2019-10-27 07:18:42
195.34.97.125 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-27 07:01:02
91.206.15.161 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 90 - port: 3400 proto: TCP cat: Misc Attack
2019-10-27 07:20:07
216.24.103.47 attackspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-27 06:59:38
77.247.110.173 attackbots
Multiport scan : 11 ports scanned 23485 28688 31954 31955 31956 49900 49901 49902 58090 58091 58092
2019-10-27 07:23:29
62.173.149.54 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 59 - port: 5060 proto: TCP cat: Misc Attack
2019-10-27 06:54:56

Recently Reported IPs

160.252.102.202 139.29.253.231 108.245.252.203 26.40.252.227
36.90.105.50 203.165.64.44 2.47.95.50 66.242.95.43
126.194.239.72 32.83.109.206 183.211.212.165 37.170.200.68
174.228.66.173 188.244.211.20 2.55.11.105 111.43.3.36
151.199.89.13 101.83.204.78 32.172.12.68 60.52.249.9