Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frutal

Region: Minas Gerais

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 45.239.234.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26300
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;45.239.234.253.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 18:08:14 CST 2021
;; MSG SIZE  rcvd: 43

'
Host info
253.234.239.45.in-addr.arpa domain name pointer 45-239-234-253.speednetinformatica.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
253.234.239.45.in-addr.arpa	name = 45-239-234-253.speednetinformatica.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
40.124.4.131 attack
$f2bV_matches
2020-03-05 06:33:45
117.50.13.170 attackbots
Mar  5 03:24:29 areeb-Workstation sshd[7207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.13.170 
Mar  5 03:24:31 areeb-Workstation sshd[7207]: Failed password for invalid user omn from 117.50.13.170 port 36996 ssh2
...
2020-03-05 06:07:59
35.227.35.222 attackspambots
$f2bV_matches
2020-03-05 06:12:47
120.70.103.40 attackspam
Mar  4 21:53:35 *** sshd[28634]: Invalid user jiangqianhu from 120.70.103.40
2020-03-05 06:43:21
222.186.175.212 attackspam
Mar  5 03:23:59 gw1 sshd[30946]: Failed password for root from 222.186.175.212 port 2752 ssh2
Mar  5 03:24:13 gw1 sshd[30946]: error: maximum authentication attempts exceeded for root from 222.186.175.212 port 2752 ssh2 [preauth]
...
2020-03-05 06:26:53
147.139.4.197 attackspam
Mar  4 22:45:48 jane sshd[21616]: Failed password for root from 147.139.4.197 port 42912 ssh2
...
2020-03-05 06:11:42
54.38.241.162 attack
Mar  4 22:51:03 lnxmysql61 sshd[16660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.241.162
Mar  4 22:51:05 lnxmysql61 sshd[16660]: Failed password for invalid user postgres from 54.38.241.162 port 54072 ssh2
Mar  4 22:54:14 lnxmysql61 sshd[16772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.241.162
2020-03-05 06:18:44
59.127.89.8 attack
Wed Mar  4 14:54:27 2020 - Child process 178651 handling connection
Wed Mar  4 14:54:27 2020 - New connection from: 59.127.89.8:37649
Wed Mar  4 14:54:27 2020 - Sending data to client: [Login: ]
Wed Mar  4 14:54:30 2020 - Child process 178659 handling connection
Wed Mar  4 14:54:30 2020 - New connection from: 59.127.89.8:37646
Wed Mar  4 14:54:30 2020 - Sending data to client: [Login: ]
Wed Mar  4 14:54:33 2020 - Got data: root
Wed Mar  4 14:54:34 2020 - Sending data to client: [Password: ]
Wed Mar  4 14:54:48 2020 - Child process 178692 handling connection
Wed Mar  4 14:54:48 2020 - New connection from: 59.127.89.8:37944
Wed Mar  4 14:54:48 2020 - Sending data to client: [Login: ]
Wed Mar  4 14:54:48 2020 - Got data: root
Wed Mar  4 14:54:49 2020 - Sending data to client: [Password: ]
Wed Mar  4 14:54:50 2020 - Got data: Zte521
Wed Mar  4 14:54:50 2020 - Child process 178693 handling connection
Wed Mar  4 14:54:50 2020 - New connection from: 59.127.89.8:37995
Wed Mar  4 14:54:50 20
2020-03-05 06:27:51
1.220.193.140 attackspambots
SSH Brute-Forcing (server2)
2020-03-05 06:22:06
91.121.103.77 attackspam
Mar  4 23:04:22 vmd17057 sshd[8680]: Failed password for root from 91.121.103.77 port 39004 ssh2
...
2020-03-05 06:40:10
139.211.57.130 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-05 06:20:29
198.55.106.250 attackbots
Mar  4 22:54:15 grey postfix/smtpd\[11738\]: NOQUEUE: reject: RCPT from unknown\[198.55.106.250\]: 554 5.7.1 Service unavailable\; Client host \[198.55.106.250\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[198.55.106.250\]\; from=\<379-37-1166453-98-principal=learning-steps.com@mail.seeingnearly.top\> to=\ proto=ESMTP helo=\
...
2020-03-05 06:18:04
122.51.107.227 attack
2020-03-04T21:59:53.234079shield sshd\[4462\]: Invalid user debian from 122.51.107.227 port 60098
2020-03-04T21:59:53.238707shield sshd\[4462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.107.227
2020-03-04T21:59:54.590338shield sshd\[4462\]: Failed password for invalid user debian from 122.51.107.227 port 60098 ssh2
2020-03-04T22:07:05.456600shield sshd\[5678\]: Invalid user anonymous from 122.51.107.227 port 38858
2020-03-04T22:07:05.463851shield sshd\[5678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.107.227
2020-03-05 06:24:30
128.199.138.31 attackbotsspam
Mar  4 12:10:21 hpm sshd\[13661\]: Invalid user testuser from 128.199.138.31
Mar  4 12:10:21 hpm sshd\[13661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.138.31
Mar  4 12:10:24 hpm sshd\[13661\]: Failed password for invalid user testuser from 128.199.138.31 port 46517 ssh2
Mar  4 12:18:42 hpm sshd\[14310\]: Invalid user nam from 128.199.138.31
Mar  4 12:18:42 hpm sshd\[14310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.138.31
2020-03-05 06:23:31
119.147.88.77 attack
$f2bV_matches
2020-03-05 06:05:08

Recently Reported IPs

201.48.119.237 122.169.105.66 109.121.245.203 77.237.204.226
109.93.48.58 23.83.81.88 41.76.213.176 62.171.173.142
45.62.56.211 93.28.46.178 93.28.46.241 194.110.13.103
185.165.171.14 117.192.224.55 190.106.33.74 105.112.117.58
179.155.229.45 103.151.47.210 208.114.128.35 2600:387:b:982::13