Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.145.58.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23089
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;0.145.58.132.			IN	A

;; AUTHORITY SECTION:
.			344	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022111100 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 11 22:07:01 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 132.58.145.0.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.58.145.0.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.144.218.254 attack
Jul 26 17:50:24 XXX sshd[29614]: Invalid user torfinn from 192.144.218.254 port 53364
2020-07-27 02:02:34
165.3.86.43 attackbotsspam
Unauthorized connection attempt from IP address 165.3.86.43 on Port 445(SMB)
2020-07-27 02:30:10
123.195.96.109 attackbots
" "
2020-07-27 02:16:35
91.106.199.101 attackbotsspam
Brute force attempt
2020-07-27 02:19:07
111.21.99.227 attack
Jul 26 19:24:25 sip sshd[1088208]: Invalid user steph from 111.21.99.227 port 58342
Jul 26 19:24:27 sip sshd[1088208]: Failed password for invalid user steph from 111.21.99.227 port 58342 ssh2
Jul 26 19:28:42 sip sshd[1088224]: Invalid user minecraft from 111.21.99.227 port 54184
...
2020-07-27 02:17:28
172.94.11.211 attackbotsspam
contact form spammer
2020-07-27 01:57:50
171.224.178.150 attack
20/7/26@08:02:29: FAIL: Alarm-Network address from=171.224.178.150
20/7/26@08:02:29: FAIL: Alarm-Network address from=171.224.178.150
...
2020-07-27 02:01:53
139.59.85.222 attackbotsspam
2020-07-25T17:10:35.834649hostname sshd[85216]: Failed password for invalid user unturned from 139.59.85.222 port 40820 ssh2
...
2020-07-27 02:24:17
188.225.78.249 attackbotsspam
Jul 26 14:01:15 vbuntu sshd[11266]: refused connect from 313758-cc79339.tmweb.ru (188.225.78.249)
Jul 26 14:02:17 vbuntu sshd[11328]: refused connect from 313758-cc79339.tmweb.ru (188.225.78.249)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=188.225.78.249
2020-07-27 02:00:02
110.17.174.253 attackbotsspam
Jul 26 11:52:59 ip-172-31-62-245 sshd\[15347\]: Invalid user patalano from 110.17.174.253\
Jul 26 11:53:01 ip-172-31-62-245 sshd\[15347\]: Failed password for invalid user patalano from 110.17.174.253 port 49794 ssh2\
Jul 26 11:57:58 ip-172-31-62-245 sshd\[15391\]: Invalid user steamcmd from 110.17.174.253\
Jul 26 11:58:00 ip-172-31-62-245 sshd\[15391\]: Failed password for invalid user steamcmd from 110.17.174.253 port 53985 ssh2\
Jul 26 12:02:32 ip-172-31-62-245 sshd\[15415\]: Invalid user ansible from 110.17.174.253\
2020-07-27 01:58:39
1.183.238.133 attackbots
07/26/2020-09:01:10.213230 1.183.238.133 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-07-27 02:11:52
144.22.74.95 attackspambots
Website hacking attempt: Improper php file access [php file]
2020-07-27 02:06:52
1.58.48.94 attackspam
SSH/22 MH Probe, BF, Hack -
2020-07-27 02:31:29
81.68.97.184 attack
SSH Brute-Forcing (server1)
2020-07-27 02:21:30
1.36.101.155 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-07-27 02:35:18

Recently Reported IPs

0.145.211.192 0.140.28.13 0.146.50.162 0.144.109.172
0.144.77.55 0.141.38.191 0.144.7.133 0.148.58.107
0.149.115.219 0.14.94.185 0.146.174.195 0.144.38.179
0.151.190.14 0.142.215.166 0.145.207.46 0.150.227.125
0.148.247.238 0.139.77.223 0.143.136.169 0.140.182.25