Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taipei

Region: Taipei

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       45.43.32.0 - 45.43.63.255
CIDR:           45.43.32.0/19
NetName:        ZEN-X-002
NetHandle:      NET-45-43-32-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Zenlayer Inc (ZENLA-7)
RegDate:        2015-03-27
Updated:        2018-02-27
Ref:            https://rdap.arin.net/registry/ip/45.43.32.0



OrgName:        Zenlayer Inc
OrgId:          ZENLA-7
Address:        21680 Gateway Center Dr. Suite 350
City:           Diamond Bar
StateProv:      CA
PostalCode:     91765
Country:        US
RegDate:        2017-12-27
Updated:        2025-09-04
Ref:            https://rdap.arin.net/registry/entity/ZENLA-7


OrgTechHandle: TANGR16-ARIN
OrgTechName:   Tang, Ruifan 
OrgTechPhone:  +1-800-858-7986 
OrgTechEmail:  ruifan.tang@zenlayer.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TANGR16-ARIN

OrgNOCHandle: IPNOC27-ARIN
OrgNOCName:   IPNOC
OrgNOCPhone:  +1-800-858-7986 
OrgNOCEmail:  ipnoc-t3@zenlayer.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/IPNOC27-ARIN

OrgAbuseHandle: SOCOP-ARIN
OrgAbuseName:   SOC Ops
OrgAbusePhone:  +1-909-718-3558 
OrgAbuseEmail:  abuse@zenlayer.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/SOCOP-ARIN

OrgTechHandle: IPNOC27-ARIN
OrgTechName:   IPNOC
OrgTechPhone:  +1-800-858-7986 
OrgTechEmail:  ipnoc-t3@zenlayer.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPNOC27-ARIN

OrgTechHandle: IPADM641-ARIN
OrgTechName:   IP ADMIN
OrgTechPhone:  +1-909-718-3558 
OrgTechEmail:  ipadmin@zenlayer.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPADM641-ARIN

OrgNOCHandle: IPADM641-ARIN
OrgNOCName:   IP ADMIN
OrgNOCPhone:  +1-909-718-3558 
OrgNOCEmail:  ipadmin@zenlayer.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/IPADM641-ARIN

# end


# start

NetRange:       45.43.37.0 - 45.43.37.255
CIDR:           45.43.37.0/24
NetName:        ZL-TPE-UCLOUD-0049
NetHandle:      NET-45-43-37-0-1
Parent:         ZEN-X-002 (NET-45-43-32-0-1)
NetType:        Reassigned
OriginAS:       
Organization:   UCLOUD (UCLOU-1)
RegDate:        2019-03-29
Updated:        2019-03-29
Comment:        Abuse please contact:unoc@ucloud.cn ,unom@ucloud.cn,hegui@ucloud.cn
Ref:            https://rdap.arin.net/registry/ip/45.43.37.0


OrgName:        UCLOUD
OrgId:          UCLOU-1
Address:        FLAT/RM 603 6/   FLAWS COMMERCIAL PLAZA 788 CHEUNG SHA WAN ROAD  KL
City:           Hong Kong
StateProv:      
PostalCode:     
Country:        HK
RegDate:        2019-02-28
Updated:        2019-02-28
Ref:            https://rdap.arin.net/registry/entity/UCLOU-1


OrgTechHandle: IAU2-ARIN
OrgTechName:   IP ABUSE Ucloud
OrgTechPhone:  +86 4000188113 
OrgTechEmail:  unoc@ucloud.cn
OrgTechRef:    https://rdap.arin.net/registry/entity/IAU2-ARIN

OrgAbuseHandle: IAU2-ARIN
OrgAbuseName:   IP ABUSE Ucloud
OrgAbusePhone:  +86 4000188113 
OrgAbuseEmail:  unoc@ucloud.cn
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IAU2-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.43.37.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62671
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.43.37.254.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012700 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 27 22:01:11 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 254.37.43.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 254.37.43.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
121.152.165.213 attackbotsspam
Invalid user carrie from 121.152.165.213 port 46180
2019-07-17 07:07:07
121.190.213.206 attackspambots
Jun 17 22:07:10 server sshd\[119431\]: Invalid user hejian from 121.190.213.206
Jun 17 22:07:10 server sshd\[119431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.190.213.206
Jun 17 22:07:11 server sshd\[119431\]: Failed password for invalid user hejian from 121.190.213.206 port 33033 ssh2
...
2019-07-17 06:54:19
118.200.199.43 attackspam
SSH Brute-Forcing (ownc)
2019-07-17 06:42:38
61.167.36.134 attackspam
Repeated attempts against wp-login
2019-07-17 06:35:57
192.241.159.27 attack
2019-07-16T22:18:49.711412abusebot-8.cloudsearch.cf sshd\[12686\]: Invalid user test from 192.241.159.27 port 56850
2019-07-17 06:48:09
121.141.148.158 attack
May  6 07:04:57 server sshd\[143949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.141.148.158  user=root
May  6 07:04:59 server sshd\[143949\]: Failed password for root from 121.141.148.158 port 53499 ssh2
May  6 07:05:00 server sshd\[143949\]: Failed password for root from 121.141.148.158 port 53499 ssh2
...
2019-07-17 07:12:36
188.35.21.186 attackspambots
[portscan] Port scan
2019-07-17 06:41:05
103.129.221.21 attack
WordPress login Brute force / Web App Attack on client site.
2019-07-17 07:13:41
191.113.112.106 attackspam
Unauthorised access (Jul 17) SRC=191.113.112.106 LEN=40 TTL=241 ID=26881 DF TCP DPT=8080 WINDOW=14600 SYN
2019-07-17 06:59:23
100.18.5.146 attackspam
Invalid user pi from 100.18.5.146 port 40302
2019-07-17 06:38:33
122.114.158.196 attack
2019-07-17T00:34:21.832318cavecanem sshd[1971]: Invalid user nano from 122.114.158.196 port 44360
2019-07-17T00:34:21.834766cavecanem sshd[1971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.158.196
2019-07-17T00:34:21.832318cavecanem sshd[1971]: Invalid user nano from 122.114.158.196 port 44360
2019-07-17T00:34:24.161791cavecanem sshd[1971]: Failed password for invalid user nano from 122.114.158.196 port 44360 ssh2
2019-07-17T00:36:27.427425cavecanem sshd[4661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.158.196  user=root
2019-07-17T00:36:29.052184cavecanem sshd[4661]: Failed password for root from 122.114.158.196 port 35428 ssh2
2019-07-17T00:38:28.978351cavecanem sshd[7189]: Invalid user admin from 122.114.158.196 port 54726
2019-07-17T00:38:28.980854cavecanem sshd[7189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.158.196
2019-
...
2019-07-17 06:44:19
176.255.56.214 attack
DATE:2019-07-16_23:09:34, IP:176.255.56.214, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-17 07:06:25
217.182.158.104 attack
Jul 16 18:43:57 plusreed sshd[4659]: Invalid user project from 217.182.158.104
...
2019-07-17 06:55:50
121.227.153.126 attack
Apr 30 03:36:25 server sshd\[134920\]: Invalid user nt from 121.227.153.126
Apr 30 03:36:25 server sshd\[134920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.227.153.126
Apr 30 03:36:27 server sshd\[134920\]: Failed password for invalid user nt from 121.227.153.126 port 56604 ssh2
...
2019-07-17 06:44:36
121.15.7.26 attackspam
Jun 24 17:09:32 server sshd\[104067\]: Invalid user kuan from 121.15.7.26
Jun 24 17:09:32 server sshd\[104067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.7.26
Jun 24 17:09:34 server sshd\[104067\]: Failed password for invalid user kuan from 121.15.7.26 port 43922 ssh2
...
2019-07-17 07:08:58

Recently Reported IPs

17.241.227.95 17.241.227.21 192.151.197.126 120.36.250.175
40.124.174.61 46.101.248.248 91.92.241.152 39.98.57.173
152.32.129.13 212.73.148.23 39.100.83.62 45.149.173.217
159.223.20.142 185.93.89.43 172.203.245.82 192.168.0.140
47.130.222.240 98.94.61.32 23.234.109.247 27.46.125.207