Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.229.54.2 attackspam
Automatic report - Port Scan Attack
2020-06-15 08:58:51
45.229.54.47 attackbots
Automatic report - Port Scan Attack
2020-04-15 20:57:22
45.229.54.35 attackbots
Autoban   45.229.54.35 AUTH/CONNECT
2019-09-13 16:14:58
45.229.54.187 attackspam
Lines containing failures of 45.229.54.187
Jul 12 19:34:10 mellenthin postfix/smtpd[2554]: connect from unknown[45.229.54.187]
Jul x@x
Jul 12 19:34:16 mellenthin postfix/smtpd[2554]: lost connection after DATA from unknown[45.229.54.187]
Jul 12 19:34:16 mellenthin postfix/smtpd[2554]: disconnect from unknown[45.229.54.187] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4
Jul 13 16:52:24 mellenthin postfix/smtpd[31568]: connect from unknown[45.229.54.187]
Jul x@x
Jul 13 16:52:30 mellenthin postfix/smtpd[31568]: lost connection after DATA from unknown[45.229.54.187]
Jul 13 16:52:30 mellenthin postfix/smtpd[31568]: disconnect from unknown[45.229.54.187] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.229.54.187
2019-07-14 03:53:00
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.229.54.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10767
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.229.54.22.			IN	A

;; AUTHORITY SECTION:
.			444	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020601 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 12:23:25 CST 2022
;; MSG SIZE  rcvd: 105
Host info
22.54.229.45.in-addr.arpa domain name pointer 22-54-229-45.redevirtualnet.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.54.229.45.in-addr.arpa	name = 22-54-229-45.redevirtualnet.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.89.165.36 attack
Invalid user tongxin from 159.89.165.36 port 55350
2020-03-11 17:16:14
181.28.233.141 attack
Invalid user ivan from 181.28.233.141 port 27201
2020-03-11 17:12:11
64.225.14.108 attackbots
Invalid user monitor from 64.225.14.108 port 49850
2020-03-11 17:02:44
106.54.114.248 attack
Invalid user infowarelab from 106.54.114.248 port 43364
2020-03-11 16:56:24
183.95.84.150 attack
Invalid user libuuid from 183.95.84.150 port 47093
2020-03-11 17:11:03
185.47.160.186 attack
Invalid user admin from 185.47.160.186 port 48880
2020-03-11 16:46:42
165.227.58.61 attackspam
Invalid user tfcserver from 165.227.58.61 port 60928
2020-03-11 16:48:37
181.49.153.74 attackspambots
Invalid user sshuser from 181.49.153.74 port 60198
2020-03-11 17:11:40
47.44.215.186 attackspambots
(sshd) Failed SSH login from 47.44.215.186 (US/United States/47-44-215-186.static.unas.mo.charter.com): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 11 09:18:01 ubnt-55d23 sshd[24042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.44.215.186  user=root
Mar 11 09:18:02 ubnt-55d23 sshd[24042]: Failed password for root from 47.44.215.186 port 20001 ssh2
2020-03-11 17:04:13
167.114.98.234 attackbotsspam
Invalid user narciso from 167.114.98.234 port 42304
2020-03-11 17:14:11
196.46.192.73 attackspambots
Invalid user webapps from 196.46.192.73 port 43998
2020-03-11 16:45:07
14.225.7.45 attack
Automatic report - SSH Brute-Force Attack
2020-03-11 17:06:09
178.62.90.225 attack
Invalid user e from 178.62.90.225 port 40426
2020-03-11 17:13:52
110.49.6.226 attackbots
Invalid user odoo from 110.49.6.226 port 41322
2020-03-11 16:55:22
45.32.102.64 attackbotsspam
2020-03-11T09:49:35.262777scmdmz1 sshd[15127]: Invalid user cnbing from 45.32.102.64 port 58300
2020-03-11T09:49:37.125881scmdmz1 sshd[15127]: Failed password for invalid user cnbing from 45.32.102.64 port 58300 ssh2
2020-03-11T09:53:27.723852scmdmz1 sshd[15539]: Invalid user postgres from 45.32.102.64 port 43946
...
2020-03-11 17:05:37

Recently Reported IPs

165.232.159.218 113.254.18.90 192.241.212.85 207.171.207.124
13.77.174.169 167.250.172.185 150.95.64.26 1.227.57.66
98.216.138.35 178.218.194.80 119.251.18.104 177.191.165.208
162.240.27.242 192.241.212.39 83.40.109.58 121.4.58.20
14.225.250.72 180.115.190.75 197.237.175.63 122.166.249.227