Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.45.205.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13544
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.45.205.245.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011500 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 15 14:19:54 CST 2025
;; MSG SIZE  rcvd: 105
Host info
245.205.45.5.in-addr.arpa domain name pointer cdn.yandex.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
245.205.45.5.in-addr.arpa	name = cdn.yandex.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
60.26.201.215 attack
Nov  3 06:54:27 vps01 sshd[27628]: Failed password for root from 60.26.201.215 port 58170 ssh2
Nov  3 06:59:37 vps01 sshd[27697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.26.201.215
2019-11-03 22:17:27
27.145.54.35 attackbotsspam
Automatic report - Port Scan Attack
2019-11-03 22:58:44
142.93.218.11 attackbotsspam
Nov  3 15:34:04 vps01 sshd[857]: Failed password for root from 142.93.218.11 port 39198 ssh2
2019-11-03 22:44:08
139.155.83.98 attackspam
Nov  3 14:38:11 MK-Soft-VM5 sshd[3610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.83.98 
Nov  3 14:38:13 MK-Soft-VM5 sshd[3610]: Failed password for invalid user zhaobin from 139.155.83.98 port 58078 ssh2
...
2019-11-03 22:26:32
83.209.219.129 attackbotsspam
$f2bV_matches
2019-11-03 22:35:58
139.155.127.59 attackbotsspam
SSH Brute-Force attacks
2019-11-03 22:18:33
175.194.143.244 attackbotsspam
Fail2Ban Ban Triggered
2019-11-03 22:22:42
104.236.78.228 attackspam
Nov  3 04:33:37 sachi sshd\[30654\]: Invalid user www from 104.236.78.228
Nov  3 04:33:37 sachi sshd\[30654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.78.228
Nov  3 04:33:39 sachi sshd\[30654\]: Failed password for invalid user www from 104.236.78.228 port 49259 ssh2
Nov  3 04:38:07 sachi sshd\[31044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.78.228  user=root
Nov  3 04:38:09 sachi sshd\[31044\]: Failed password for root from 104.236.78.228 port 40111 ssh2
2019-11-03 22:56:00
174.138.18.157 attackbots
Repeated brute force against a port
2019-11-03 22:21:29
207.154.234.102 attack
Nov 03 02:30:36 askasleikir sshd[38097]: Failed password for root from 207.154.234.102 port 49940 ssh2
Nov 03 02:19:22 askasleikir sshd[38013]: Failed password for root from 207.154.234.102 port 56416 ssh2
Nov 03 02:44:10 askasleikir sshd[38206]: Failed password for root from 207.154.234.102 port 57712 ssh2
2019-11-03 22:24:16
91.183.148.190 attack
2019-11-03T06:42:50.229189mail01 postfix/smtpd[8398]: warning: unknown[91.183.148.190]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-03T06:42:56.303181mail01 postfix/smtpd[2096]: warning: unknown[91.183.148.190]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-03T06:43:06.377892mail01 postfix/smtpd[17860]: warning: unknown[91.183.148.190]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-03 22:39:42
94.191.31.53 attackspam
Automatic report - Banned IP Access
2019-11-03 22:27:18
83.4.80.8 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/83.4.80.8/ 
 
 PL - 1H : (128)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN5617 
 
 IP : 83.4.80.8 
 
 CIDR : 83.0.0.0/13 
 
 PREFIX COUNT : 183 
 
 UNIQUE IP COUNT : 5363456 
 
 
 ATTACKS DETECTED ASN5617 :  
  1H - 2 
  3H - 5 
  6H - 12 
 12H - 32 
 24H - 73 
 
 DateTime : 2019-11-03 06:43:25 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-03 22:32:55
45.82.153.133 attack
Nov  3 15:16:50 localhost postfix/smtpd\[24513\]: warning: unknown\[45.82.153.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  3 15:17:13 localhost postfix/smtpd\[24524\]: warning: unknown\[45.82.153.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  3 15:18:35 localhost postfix/smtpd\[24513\]: warning: unknown\[45.82.153.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  3 15:19:00 localhost postfix/smtpd\[24602\]: warning: unknown\[45.82.153.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  3 15:26:04 localhost postfix/smtpd\[24778\]: warning: unknown\[45.82.153.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-03 22:34:46
101.91.217.94 attackspambots
Nov  3 15:32:37 sd-53420 sshd\[8010\]: Invalid user paul from 101.91.217.94
Nov  3 15:32:37 sd-53420 sshd\[8010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.217.94
Nov  3 15:32:39 sd-53420 sshd\[8010\]: Failed password for invalid user paul from 101.91.217.94 port 48014 ssh2
Nov  3 15:38:18 sd-53420 sshd\[8400\]: User root from 101.91.217.94 not allowed because none of user's groups are listed in AllowGroups
Nov  3 15:38:18 sd-53420 sshd\[8400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.217.94  user=root
...
2019-11-03 22:51:07

Recently Reported IPs

51.203.48.236 30.152.242.72 219.146.63.85 57.43.243.132
182.170.225.10 44.18.45.174 227.199.234.21 106.77.214.201
150.0.92.127 44.118.30.95 89.131.20.111 159.52.236.255
229.39.139.164 215.13.201.27 27.164.141.121 250.254.194.227
38.75.10.159 150.45.227.39 240.153.46.166 43.254.11.56