Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.201.52.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38066
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.201.52.253.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031200 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 12 22:13:29 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 253.52.201.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 253.52.201.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
34.67.159.1 attack
Sep  8 00:58:19 vps691689 sshd[19460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.67.159.1
Sep  8 00:58:21 vps691689 sshd[19460]: Failed password for invalid user postgres from 34.67.159.1 port 58994 ssh2
...
2019-09-08 07:09:50
213.14.116.235 attack
xmlrpc attack
2019-09-08 07:21:46
134.209.103.14 attack
Sep  7 12:41:49 hanapaa sshd\[11732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.103.14  user=root
Sep  7 12:41:52 hanapaa sshd\[11732\]: Failed password for root from 134.209.103.14 port 54952 ssh2
Sep  7 12:46:24 hanapaa sshd\[12110\]: Invalid user gpadmin from 134.209.103.14
Sep  7 12:46:24 hanapaa sshd\[12110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.103.14
Sep  7 12:46:26 hanapaa sshd\[12110\]: Failed password for invalid user gpadmin from 134.209.103.14 port 41902 ssh2
2019-09-08 07:01:16
113.161.104.106 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-07 21:12:35,457 INFO [amun_request_handler] PortScan Detected on Port: 445 (113.161.104.106)
2019-09-08 07:34:06
106.12.241.109 attackspam
Sep  8 02:25:34 tuotantolaitos sshd[18377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.241.109
Sep  8 02:25:36 tuotantolaitos sshd[18377]: Failed password for invalid user ubuntu from 106.12.241.109 port 52304 ssh2
...
2019-09-08 07:31:50
87.27.84.84 attackbotsspam
Automatic report - Port Scan Attack
2019-09-08 07:19:51
149.202.45.205 attack
Sep  7 16:48:16 aat-srv002 sshd[22030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.45.205
Sep  7 16:48:19 aat-srv002 sshd[22030]: Failed password for invalid user test from 149.202.45.205 port 55392 ssh2
Sep  7 16:52:19 aat-srv002 sshd[22126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.45.205
Sep  7 16:52:21 aat-srv002 sshd[22126]: Failed password for invalid user system from 149.202.45.205 port 42756 ssh2
...
2019-09-08 07:14:27
49.88.112.63 attackspam
SSH Brute-Force reported by Fail2Ban
2019-09-08 06:51:03
185.93.2.120 attack
\[2019-09-07 18:57:27\] NOTICE\[1827\] chan_sip.c: Registration from '\' failed for '185.93.2.120:3095' - Wrong password
\[2019-09-07 18:57:27\] SECURITY\[1849\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-07T18:57:27.712-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1047",SessionID="0x7fd9a81ef8c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.93.2.120/58698",Challenge="71844197",ReceivedChallenge="71844197",ReceivedHash="1c7abb35a691e3cdc27d9f139e78bd08"
\[2019-09-07 18:57:59\] NOTICE\[1827\] chan_sip.c: Registration from '\' failed for '185.93.2.120:3176' - Wrong password
\[2019-09-07 18:57:59\] SECURITY\[1849\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-07T18:57:59.694-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="6035",SessionID="0x7fd9a8123cd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.93.2.120/6
2019-09-08 07:15:37
70.125.42.101 attack
$f2bV_matches
2019-09-08 07:25:41
159.192.133.106 attack
Sep  7 19:13:19 ny01 sshd[12741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.133.106
Sep  7 19:13:20 ny01 sshd[12741]: Failed password for invalid user sinusbot123 from 159.192.133.106 port 57165 ssh2
Sep  7 19:18:52 ny01 sshd[13702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.133.106
2019-09-08 07:27:54
54.36.150.68 attackspam
Automatic report - Banned IP Access
2019-09-08 07:08:08
213.6.141.114 attackbotsspam
Mail sent to address hacked/leaked from Last.fm
2019-09-08 07:07:22
104.251.236.182 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-07 21:18:21,548 INFO [amun_request_handler] PortScan Detected on Port: 445 (104.251.236.182)
2019-09-08 07:06:57
46.227.63.58 attackspam
Sep  8 01:33:49 server sshd\[29620\]: Invalid user tomcat from 46.227.63.58 port 52848
Sep  8 01:33:49 server sshd\[29620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.227.63.58
Sep  8 01:33:51 server sshd\[29620\]: Failed password for invalid user tomcat from 46.227.63.58 port 52848 ssh2
Sep  8 01:38:21 server sshd\[10921\]: Invalid user mc3 from 46.227.63.58 port 46609
Sep  8 01:38:21 server sshd\[10921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.227.63.58
2019-09-08 06:53:22

Recently Reported IPs

25.196.142.9 87.81.93.41 83.147.208.92 123.185.247.213
23.117.3.222 189.60.144.140 214.82.83.44 70.100.185.106
74.47.101.185 145.234.48.145 120.81.136.107 221.138.194.57
107.44.19.82 66.152.178.31 125.19.112.37 243.196.163.224
130.201.108.43 170.156.58.158 109.38.249.243 170.205.202.143