Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cascavel

Region: Parana

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.234.216.43 attackspam
unauthorized connection attempt
2020-06-30 19:24:20
45.234.205.141 attack
Unauthorized connection attempt detected from IP address 45.234.205.141 to port 8000
2020-06-22 08:14:36
45.234.28.21 attackbots
Automatic report - Port Scan Attack
2020-05-16 02:54:38
45.234.222.143 attackspam
8080/tcp
[2020-05-01]1pkt
2020-05-02 02:30:26
45.234.206.2 attackbots
Email rejected due to spam filtering
2020-03-10 05:14:13
45.234.221.246 attackbots
Unauthorized connection attempt detected from IP address 45.234.221.246 to port 8080 [J]
2020-03-02 14:44:45
45.234.23.184 attackspam
unauthorized connection attempt
2020-02-16 15:32:29
45.234.220.2 attack
Automatic report - Port Scan Attack
2020-02-16 13:03:39
45.234.223.153 attackbots
DATE:2020-02-02 16:06:56, IP:45.234.223.153, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-02-03 04:48:43
45.234.251.241 attackspambots
Spam
2020-01-14 23:19:42
45.234.220.2 attackbots
Unauthorized connection attempt detected from IP address 45.234.220.2 to port 80 [J]
2020-01-12 19:14:34
45.234.251.124 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/45.234.251.124/ 
 BR - 1H : (264)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN267388 
 
 IP : 45.234.251.124 
 
 CIDR : 45.234.251.0/24 
 
 PREFIX COUNT : 4 
 
 UNIQUE IP COUNT : 1024 
 
 
 WYKRYTE ATAKI Z ASN267388 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-11 05:49:49 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-11 17:42:52
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.234.2.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41371
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.234.2.253.			IN	A

;; AUTHORITY SECTION:
.			382	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022071200 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jul 12 21:31:07 CST 2022
;; MSG SIZE  rcvd: 105
Host info
253.2.234.45.in-addr.arpa domain name pointer dinamico-253.mundialtelecom.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
253.2.234.45.in-addr.arpa	name = dinamico-253.mundialtelecom.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
36.91.145.99 attackspam
Unauthorized connection attempt from IP address 36.91.145.99 on Port 445(SMB)
2020-06-30 08:15:25
1.196.168.35 attackbots
1593459975 - 06/29/2020 21:46:15 Host: 1.196.168.35/1.196.168.35 Port: 445 TCP Blocked
2020-06-30 07:53:46
73.84.178.240 attack
port scan and connect, tcp 81 (hosts2-ns)
2020-06-30 08:06:18
46.38.150.72 attackbotsspam
Jun 30 01:44:23 v22019058497090703 postfix/smtpd[15322]: warning: unknown[46.38.150.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 30 01:45:23 v22019058497090703 postfix/smtpd[15322]: warning: unknown[46.38.150.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 30 01:46:22 v22019058497090703 postfix/smtpd[15322]: warning: unknown[46.38.150.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-30 07:50:20
45.199.104.62 attackbotsspam
SS5,DEF GET /phpmyadmin/index.php
2020-06-30 07:58:58
61.177.172.54 attackbotsspam
Jun 30 02:03:13 vmd48417 sshd[7178]: Failed password for root from 61.177.172.54 port 33448 ssh2
2020-06-30 08:04:31
59.152.62.40 attackbotsspam
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-06-30 07:45:32
222.232.29.235 attackspambots
Jun 30 01:52:54 inter-technics sshd[495]: Invalid user comp from 222.232.29.235 port 37238
Jun 30 01:52:54 inter-technics sshd[495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.232.29.235
Jun 30 01:52:54 inter-technics sshd[495]: Invalid user comp from 222.232.29.235 port 37238
Jun 30 01:52:57 inter-technics sshd[495]: Failed password for invalid user comp from 222.232.29.235 port 37238 ssh2
Jun 30 01:59:23 inter-technics sshd[1139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.232.29.235  user=root
Jun 30 01:59:25 inter-technics sshd[1139]: Failed password for root from 222.232.29.235 port 60252 ssh2
...
2020-06-30 08:01:19
202.190.14.121 attack
Unauthorized connection attempt from IP address 202.190.14.121 on Port 445(SMB)
2020-06-30 08:07:36
192.241.227.7 attackbotsspam
8945/tcp 123/udp
[2020-06-27/29]2pkt
2020-06-30 07:53:01
138.219.70.46 attackbots
Automatic report - Port Scan Attack
2020-06-30 07:47:40
152.32.105.12 attackbots
1593467159 - 06/29/2020 23:45:59 Host: 152.32.105.12/152.32.105.12 Port: 445 TCP Blocked
2020-06-30 07:50:55
49.213.179.230 attackspam
Honeypot attack, port: 81, PTR: 230-179-213-49.tinp.net.tw.
2020-06-30 08:16:14
192.241.226.144 attack
Unauthorized connection attempt from IP address 192.241.226.144 on Port 587(SMTP-MSA)
2020-06-30 08:05:29
210.56.23.100 attack
Bruteforce detected by fail2ban
2020-06-30 08:03:46

Recently Reported IPs

154.201.33.194 213.166.78.191 172.245.155.49 154.202.101.9
109.116.201.206 149.241.71.66 154.202.101.5 154.202.112.179
193.233.137.148 135.148.88.165 192.177.191.148 144.168.148.201
177.203.175.176 177.96.103.241 91.188.246.178 95.181.150.213
154.201.59.182 49.213.228.85 43.128.114.154 187.121.169.146