Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.220.253.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 258
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.220.253.200.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022401 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 13:16:46 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'200.253.220.45.in-addr.arpa domain name pointer 45-220-253-200.dynamic.efibre.net.za.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
200.253.220.45.in-addr.arpa	name = 45-220-253-200.dynamic.efibre.net.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.163.178.146 attackbots
Triggered by Fail2Ban at Vostok web server
2019-11-28 05:06:03
173.16.141.33 attackbotsspam
Nov 27 17:30:35 ns41 sshd[10958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.16.141.33
Nov 27 17:30:35 ns41 sshd[10960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.16.141.33
Nov 27 17:30:37 ns41 sshd[10958]: Failed password for invalid user pi from 173.16.141.33 port 54846 ssh2
Nov 27 17:30:37 ns41 sshd[10960]: Failed password for invalid user pi from 173.16.141.33 port 54850 ssh2
2019-11-28 05:32:32
177.45.179.68 attack
Unauthorized connection attempt from IP address 177.45.179.68 on Port 445(SMB)
2019-11-28 05:38:49
46.37.189.146 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-11-28 05:34:36
116.107.112.14 attackspam
Unauthorized connection attempt from IP address 116.107.112.14 on Port 445(SMB)
2019-11-28 05:41:32
217.243.255.199 attackspam
" "
2019-11-28 05:33:26
189.209.252.150 attackspambots
Unauthorized connection attempt from IP address 189.209.252.150 on Port 445(SMB)
2019-11-28 05:23:47
118.24.149.173 attackspambots
2019-11-27T16:48:38.459915shield sshd\[17219\]: Invalid user roemer from 118.24.149.173 port 48650
2019-11-27T16:48:38.464176shield sshd\[17219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.149.173
2019-11-27T16:48:40.308678shield sshd\[17219\]: Failed password for invalid user roemer from 118.24.149.173 port 48650 ssh2
2019-11-27T16:57:25.423801shield sshd\[18106\]: Invalid user tini from 118.24.149.173 port 55284
2019-11-27T16:57:25.428405shield sshd\[18106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.149.173
2019-11-28 05:15:26
35.161.124.10 attack
Automatic report - XMLRPC Attack
2019-11-28 05:35:47
99.29.90.25 attackspam
SSH Brute-Force attacks
2019-11-28 05:15:50
190.2.141.150 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-28 05:07:03
116.193.134.97 attackspam
Nov 27 20:06:27 ncomp sshd[30131]: Invalid user ruggieri from 116.193.134.97
Nov 27 20:06:27 ncomp sshd[30131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.193.134.97
Nov 27 20:06:27 ncomp sshd[30131]: Invalid user ruggieri from 116.193.134.97
Nov 27 20:06:30 ncomp sshd[30131]: Failed password for invalid user ruggieri from 116.193.134.97 port 54918 ssh2
2019-11-28 05:03:43
219.129.32.1 attack
Nov 27 21:47:19 webhost01 sshd[22938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.129.32.1
Nov 27 21:47:21 webhost01 sshd[22938]: Failed password for invalid user rebekah from 219.129.32.1 port 36690 ssh2
...
2019-11-28 05:38:06
103.18.93.242 attackbotsspam
445/tcp
[2019-11-27]1pkt
2019-11-28 05:35:27
85.56.168.157 attackbotsspam
Unauthorized connection attempt from IP address 85.56.168.157 on Port 445(SMB)
2019-11-28 05:24:42

Recently Reported IPs

206.166.80.150 119.149.217.193 61.130.22.130 80.82.68.184
164.223.161.206 240.72.137.177 212.51.206.82 60.207.67.240
119.106.94.235 242.34.177.207 189.160.168.117 182.148.137.199
28.44.228.64 41.198.17.178 120.16.86.178 25.249.3.207
99.213.198.51 221.29.114.22 151.159.68.126 85.194.118.153