Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Telecom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.254.68.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60150
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.254.68.69.			IN	A

;; AUTHORITY SECTION:
.			152	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122902 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 30 09:16:48 CST 2021
;; MSG SIZE  rcvd: 105
Host info
Host 69.68.254.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 69.68.254.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.44.223.202 attackspambots
Autoban   187.44.223.202 AUTH/CONNECT
2019-06-25 07:10:51
68.115.194.189 attackspam
Jun 24 17:03:36 gcems sshd\[9461\]: Invalid user info from 68.115.194.189 port 45738
Jun 24 17:03:36 gcems sshd\[9461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.115.194.189
Jun 24 17:03:38 gcems sshd\[9461\]: Failed password for invalid user info from 68.115.194.189 port 45738 ssh2
Jun 24 17:05:40 gcems sshd\[9609\]: Invalid user hadoop from 68.115.194.189 port 38406
Jun 24 17:05:40 gcems sshd\[9609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.115.194.189
...
2019-06-25 06:42:01
70.49.103.238 attackspam
Jun 25 00:36:21 ns37 sshd[17134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.49.103.238
Jun 25 00:36:21 ns37 sshd[17134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.49.103.238
2019-06-25 06:56:10
187.120.140.222 attackspambots
SMTP-sasl brute force
...
2019-06-25 07:02:43
187.44.254.62 attackspambots
Autoban   187.44.254.62 AUTH/CONNECT
2019-06-25 07:07:53
104.255.100.121 attackbots
Lines containing failures of 104.255.100.121


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.255.100.121
2019-06-25 06:55:43
105.173.53.125 attackbots
Unauthorized connection attempt from IP address 105.173.53.125 on Port 445(SMB)
2019-06-25 07:20:33
188.240.221.106 attackspam
Autoban   188.240.221.106 AUTH/CONNECT
2019-06-25 06:37:19
188.138.70.167 attackbotsspam
Autoban   188.138.70.167 AUTH/CONNECT
2019-06-25 06:54:15
95.153.30.172 attackspambots
WP Authentication failure
2019-06-25 07:09:10
187.95.236.246 attackbotsspam
Autoban   187.95.236.246 AUTH/CONNECT
2019-06-25 07:03:03
188.157.8.128 attackspambots
Autoban   188.157.8.128 AUTH/CONNECT
2019-06-25 06:47:17
187.36.172.199 attackspambots
Autoban   187.36.172.199 AUTH/CONNECT
2019-06-25 07:14:57
188.194.25.117 attackbots
Autoban   188.194.25.117 AUTH/CONNECT
2019-06-25 06:41:18
187.44.134.150 attack
Autoban   187.44.134.150 AUTH/CONNECT
2019-06-25 07:11:57

Recently Reported IPs

250.27.27.58 133.11.222.138 91.119.136.133 65.103.132.224
244.160.201.246 136.47.98.153 17.149.70.63 143.117.57.196
200.213.254.162 12.52.135.87 94.27.20.190 9.100.162.238
107.77.215.118 140.17.216.142 23.17.144.167 126.46.31.163
128.114.255.185 167.230.250.83 211.71.57.230 87.212.90.245