Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.7.20.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38354
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.7.20.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 14:54:37 CST 2025
;; MSG SIZE  rcvd: 102
Host info
Host 45.20.7.5.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.20.7.5.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.69.244.66 attack
Dovecot Invalid User Login Attempt.
2020-09-01 07:26:21
51.178.81.106 attack
WordPress login Brute force / Web App Attack on client site.
2020-09-01 07:36:12
66.198.240.10 attackspambots
xmlrpc attack
2020-09-01 07:23:00
82.136.83.224 attack
Triggered: repeated knocking on closed ports.
2020-09-01 07:34:48
192.241.220.154 attackbotsspam
firewall-block, port(s): 7574/tcp
2020-09-01 07:36:31
45.186.164.18 attack
Automatic report - XMLRPC Attack
2020-09-01 07:22:03
115.222.102.134 attackbotsspam
xeon.petend.hu:80 115.222.102.134 - - [31/Aug/2020:22:58:12 +0200] "CONNECT xeon.petend.hu:443 HTTP/1.1" 302 503 "-" "-"
2020-09-01 07:51:42
54.197.222.220 attackbotsspam
404 NOT FOUND
2020-09-01 07:42:28
87.251.66.30 attack
400 BAD REQUEST
2020-09-01 07:39:31
217.182.79.176 attackspam
Failed password for root from 217.182.79.176 port 42584 ssh2
2020-09-01 07:38:15
49.83.241.166 attack
Aug 31 22:10:05 host sshd[30635]: Invalid user netscreen from 49.83.241.166 port 47448
Aug 31 22:10:06 host sshd[30637]: Invalid user misp from 49.83.241.166 port 48062
Aug 31 22:10:12 host sshd[30641]: Invalid user admin from 49.83.241.166 port 49647
Aug 31 22:10:15 host sshd[30643]: Invalid user admin from 49.83.241.166 port 50835
Aug 31 22:10:17 host sshd[30645]: Invalid user admin from 49.83.241.166 port 51992
Aug 31 22:10:19 host sshd[30647]: Invalid user admin from 49.83.241.166 port 52859
Aug 31 22:10:21 host sshd[30649]: Invalid user admin from 49.83.241.166 port 53769
Au
...
2020-09-01 07:18:39
213.217.1.42 attackbots
Fail2Ban Ban Triggered
2020-09-01 07:29:50
221.222.204.174 attack
Aug 31 19:00:42 NPSTNNYC01T sshd[26991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.222.204.174
Aug 31 19:00:44 NPSTNNYC01T sshd[26991]: Failed password for invalid user git from 221.222.204.174 port 44987 ssh2
Aug 31 19:03:26 NPSTNNYC01T sshd[27372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.222.204.174
...
2020-09-01 07:16:19
202.96.99.82 attackbotsspam
Port scanning
2020-09-01 07:47:41
139.162.121.165 attackspambots
firewall-block, port(s): 8080/tcp
2020-09-01 07:42:49

Recently Reported IPs

244.27.152.106 152.221.141.43 145.135.36.68 136.141.79.203
15.91.31.31 243.221.194.22 65.217.184.37 104.127.55.54
170.192.0.71 136.172.145.181 91.128.40.129 88.219.45.149
233.39.108.209 124.212.7.22 62.158.91.234 171.170.156.58
136.192.244.12 95.199.156.20 32.139.4.12 13.19.116.13