Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: St Petersburg

Region: St.-Petersburg

Country: Russia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.91.54.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31725
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.91.54.52.			IN	A

;; AUTHORITY SECTION:
.			421	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011500 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 15 19:19:08 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 52.54.91.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.54.91.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.201.8.154 attackbots
" "
2019-06-24 12:05:47
80.211.241.185 attackbotsspam
Many RDP login attempts detected by IDS script
2019-06-24 11:50:21
47.180.89.23 attackspam
Jun 23 21:49:35 mail sshd\[25935\]: Invalid user divya from 47.180.89.23
Jun 23 21:49:35 mail sshd\[25935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.180.89.23
Jun 23 21:49:37 mail sshd\[25935\]: Failed password for invalid user divya from 47.180.89.23 port 47947 ssh2
...
2019-06-24 11:39:20
166.62.103.30 attackspambots
166.62.103.30 - - [23/Jun/2019:21:48:10 +0200] "POST [munged]wp-login.php HTTP/1.1" 444 0 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 0.000
2019-06-24 11:59:02
186.227.37.254 attack
SMTP-sasl brute force
...
2019-06-24 12:25:27
194.44.94.71 attackbotsspam
Many RDP login attempts detected by IDS script
2019-06-24 11:49:56
89.1.211.139 attack
2019-06-23 21:47:27,450 [snip] proftpd[25896] [snip] (cgn-89-1-211-139.nc.de[89.1.211.139]): USER Lelli (Login failed): No such user found
2019-06-23 21:47:32,144 [snip] proftpd[25926] [snip] (cgn-89-1-211-139.nc.de[89.1.211.139]): USER Lelli (Login failed): No such user found
2019-06-23 21:47:38,207 [snip] proftpd[25940] [snip] (cgn-89-1-211-139.nc.de[89.1.211.139]): USER Lelli (Login failed): No such user found[...]
2019-06-24 12:09:22
46.101.77.58 attack
2019-06-24T02:47:53.989068enmeeting.mahidol.ac.th sshd\[13754\]: Invalid user hoge from 46.101.77.58 port 46759
2019-06-24T02:47:54.003900enmeeting.mahidol.ac.th sshd\[13754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.77.58
2019-06-24T02:47:56.009361enmeeting.mahidol.ac.th sshd\[13754\]: Failed password for invalid user hoge from 46.101.77.58 port 46759 ssh2
...
2019-06-24 12:04:15
179.174.47.250 attackbotsspam
Telnet Server BruteForce Attack
2019-06-24 12:27:08
179.108.240.104 attackbotsspam
SMTP-sasl brute force
...
2019-06-24 11:56:08
187.84.174.216 attack
$f2bV_matches
2019-06-24 12:30:52
191.53.199.224 attackspam
$f2bV_matches
2019-06-24 12:21:02
157.230.38.69 attack
Invalid user admin from 157.230.38.69 port 44764
2019-06-24 12:31:58
200.66.116.24 attackspambots
SMTP-sasl brute force
...
2019-06-24 11:38:43
89.142.21.68 attackbots
C1,WP GET /lappan/wp-login.php
2019-06-24 12:03:39

Recently Reported IPs

42.251.130.72 124.156.117.153 255.34.202.220 208.190.64.60
165.96.74.237 22.114.187.104 24.98.153.148 171.17.36.132
125.81.239.71 149.40.120.69 91.205.3.199 60.253.36.181
119.85.0.11 255.38.38.81 5.21.248.87 189.64.89.254
197.141.49.97 230.50.1.218 138.76.86.139 92.164.184.92