Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.45.51.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47622
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.45.51.30.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 23:24:58 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 30.51.45.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.51.45.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.84.229.101 attackspambots
20/1/31@23:55:59: FAIL: Alarm-Network address from=219.84.229.101
...
2020-02-01 15:00:28
151.80.19.228 attackspam
Feb  1 06:27:11 gitlab-tf sshd\[11914\]: Invalid user usersync from 151.80.19.228Feb  1 06:28:08 gitlab-tf sshd\[12050\]: Invalid user ultraserve from 151.80.19.228
...
2020-02-01 15:01:43
111.231.89.197 attackbotsspam
Unauthorized connection attempt detected from IP address 111.231.89.197 to port 2220 [J]
2020-02-01 15:02:33
213.32.20.107 attackspam
WordPress wp-login brute force :: 213.32.20.107 0.180 - [01/Feb/2020:06:14:26  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1806 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-02-01 15:20:24
180.250.22.66 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-01 15:23:34
213.150.206.88 attackspambots
Feb  1 06:49:55 mout sshd[3421]: Invalid user pass from 213.150.206.88 port 38542
2020-02-01 14:48:21
159.65.174.81 attackbotsspam
Unauthorized connection attempt detected from IP address 159.65.174.81 to port 8442 [J]
2020-02-01 14:59:07
171.119.74.211 attackbotsspam
Unauthorised access (Feb  1) SRC=171.119.74.211 LEN=40 TTL=49 ID=1757 TCP DPT=8080 WINDOW=26383 SYN 
Unauthorised access (Jan 30) SRC=171.119.74.211 LEN=40 TTL=49 ID=59822 TCP DPT=8080 WINDOW=26383 SYN 
Unauthorised access (Jan 29) SRC=171.119.74.211 LEN=40 TTL=49 ID=27160 TCP DPT=8080 WINDOW=26363 SYN 
Unauthorised access (Jan 29) SRC=171.119.74.211 LEN=40 TTL=49 ID=48329 TCP DPT=8080 WINDOW=26383 SYN 
Unauthorised access (Jan 28) SRC=171.119.74.211 LEN=40 TTL=49 ID=34424 TCP DPT=8080 WINDOW=26363 SYN
2020-02-01 14:56:44
84.20.86.108 attackspam
"GET / HTTP/1.1"

PORT     STATE SERVICE        VERSION
2000/tcp open  bandwidth-test MikroTik bandwidth-test server
8291/tcp open  unknown
2020-02-01 14:45:40
152.136.55.139 attackspambots
Unauthorized connection attempt detected from IP address 152.136.55.139 to port 2220 [J]
2020-02-01 15:18:38
190.6.86.10 attackspambots
Fail2Ban Ban Triggered
2020-02-01 15:21:45
185.232.67.5 attackspambots
Feb  1 06:46:08 dedicated sshd[2709]: Invalid user admin from 185.232.67.5 port 52461
2020-02-01 14:58:16
80.82.77.139 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 515 proto: TCP cat: Misc Attack
2020-02-01 15:02:16
180.76.98.25 attackbotsspam
Unauthorized connection attempt detected from IP address 180.76.98.25 to port 2220 [J]
2020-02-01 15:13:20
222.186.42.136 attack
Fail2Ban Ban Triggered (2)
2020-02-01 14:47:34

Recently Reported IPs

84.13.180.123 202.191.4.239 180.195.166.171 40.171.61.208
217.71.64.238 205.154.111.50 241.105.162.155 161.139.4.51
66.17.140.16 40.198.178.77 198.146.177.171 68.231.112.149
72.223.205.18 139.102.36.244 169.89.91.35 137.2.114.26
190.155.227.221 45.192.173.136 255.178.25.176 57.61.248.193