Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: North Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.89.253.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20802
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.89.253.66.			IN	A

;; AUTHORITY SECTION:
.			416	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 08:23:33 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 66.253.89.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.253.89.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
195.54.161.28 attack
07/24/2020-01:19:43.297962 195.54.161.28 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-24 15:11:04
178.128.103.151 attack
178.128.103.151 - - \[24/Jul/2020:08:23:22 +0200\] "POST /wp-login.php HTTP/1.0" 200 6528 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
178.128.103.151 - - \[24/Jul/2020:08:23:35 +0200\] "POST /wp-login.php HTTP/1.0" 200 6347 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
178.128.103.151 - - \[24/Jul/2020:08:23:49 +0200\] "POST /wp-login.php HTTP/1.0" 200 6351 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-07-24 15:29:08
223.204.236.155 attack
Host Scan
2020-07-24 15:18:31
114.142.173.60 attackspambots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-24 15:02:29
182.53.52.35 attack
Host Scan
2020-07-24 15:36:06
185.234.216.64 attack
Jul 23 14:05:14 WHD8 postfix/smtpd\[45983\]: warning: unknown\[185.234.216.64\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 23 17:30:29 WHD8 postfix/smtpd\[68978\]: warning: unknown\[185.234.216.64\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 23 19:09:20 WHD8 postfix/smtpd\[78900\]: warning: unknown\[185.234.216.64\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 23 20:48:59 WHD8 postfix/smtpd\[86326\]: warning: unknown\[185.234.216.64\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 23 22:33:07 WHD8 postfix/smtpd\[94484\]: warning: unknown\[185.234.216.64\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 24 00:17:53 WHD8 postfix/smtpd\[102588\]: warning: unknown\[185.234.216.64\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 24 03:46:37 WHD8 postfix/smtpd\[117513\]: warning: unknown\[185.234.216.64\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 24 05:31:40 WHD8 postfix/smtpd\[125014\]: warning: unknown\[185.234.216.64\]: SASL LOGIN authentic
...
2020-07-24 15:13:14
106.55.168.232 attackspam
2020-07-24T07:14:21.801715randservbullet-proofcloud-66.localdomain sshd[1690]: Invalid user ns from 106.55.168.232 port 58124
2020-07-24T07:14:21.806024randservbullet-proofcloud-66.localdomain sshd[1690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.168.232
2020-07-24T07:14:21.801715randservbullet-proofcloud-66.localdomain sshd[1690]: Invalid user ns from 106.55.168.232 port 58124
2020-07-24T07:14:23.953480randservbullet-proofcloud-66.localdomain sshd[1690]: Failed password for invalid user ns from 106.55.168.232 port 58124 ssh2
...
2020-07-24 15:20:52
51.75.129.23 attackspambots
Jul 24 08:53:44 vps639187 sshd\[23550\]: Invalid user inst01 from 51.75.129.23 port 47158
Jul 24 08:53:44 vps639187 sshd\[23550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.129.23
Jul 24 08:53:46 vps639187 sshd\[23550\]: Failed password for invalid user inst01 from 51.75.129.23 port 47158 ssh2
...
2020-07-24 15:06:34
89.90.209.252 attackbotsspam
Invalid user engineer from 89.90.209.252 port 58348
2020-07-24 15:14:20
178.151.175.253 attackspambots
[portscan] Port scan
2020-07-24 15:27:33
78.159.97.15 attackspambots
[portscan] Port scan
2020-07-24 15:12:48
213.32.92.57 attackspam
IP blocked
2020-07-24 15:27:00
121.186.122.216 attackbots
Invalid user ubuntu from 121.186.122.216 port 51328
2020-07-24 15:03:43
154.28.188.142 attack
For more than one day (he is still trying) try to log in my NAS
[Users] Failed to log in via user account "admin". Source IP address: 154.28.188.28.
2020-07-24 15:39:12
14.184.238.5 attack
Host Scan
2020-07-24 15:04:52

Recently Reported IPs

200.105.101.160 77.137.245.120 138.23.101.225 9.179.207.91
136.71.30.101 177.3.165.52 160.128.40.232 201.117.239.173
116.86.176.78 126.132.112.87 195.174.154.182 34.3.116.48
254.36.61.246 32.118.119.100 253.149.91.138 219.108.53.130
252.14.136.9 5.133.122.49 82.25.164.156 169.251.239.37