Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.131.45.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26946
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.131.45.138.			IN	A

;; AUTHORITY SECTION:
.			207	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012401 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 25 08:40:28 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 138.45.131.111.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.45.131.111.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
109.111.137.128 attackspambots
Attempted connection to port 80.
2020-05-12 20:02:37
106.104.170.12 attackbots
Attempted connection to port 81.
2020-05-12 20:03:05
188.166.226.26 attackbotsspam
$f2bV_matches
2020-05-12 20:14:42
190.36.15.27 attackspambots
Attempted connection to port 445.
2020-05-12 19:54:42
89.176.9.98 attackspambots
$f2bV_matches
2020-05-12 19:58:45
14.186.115.156 attack
Unauthorized connection attempt from IP address 14.186.115.156 on Port 445(SMB)
2020-05-12 19:42:13
182.74.25.246 attackspambots
Invalid user sys from 182.74.25.246 port 36931
2020-05-12 20:00:16
223.152.186.226 attack
Attempted connection to port 80.
2020-05-12 19:50:58
162.158.187.228 attackbots
$f2bV_matches
2020-05-12 20:24:44
103.233.79.17 attackspam
$f2bV_matches
2020-05-12 20:15:59
162.158.187.220 attackspam
$f2bV_matches
2020-05-12 20:25:28
220.133.186.203 attackspam
Attempted connection to port 83.
2020-05-12 19:52:53
89.163.132.37 attack
2020-05-12T11:40:01.259472shield sshd\[9494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=rs003578.fastrootserver.de  user=root
2020-05-12T11:40:02.987889shield sshd\[9494\]: Failed password for root from 89.163.132.37 port 58396 ssh2
2020-05-12T11:45:38.330472shield sshd\[11203\]: Invalid user ashish from 89.163.132.37 port 33725
2020-05-12T11:45:38.334339shield sshd\[11203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=rs003578.fastrootserver.de
2020-05-12T11:45:40.663290shield sshd\[11203\]: Failed password for invalid user ashish from 89.163.132.37 port 33725 ssh2
2020-05-12 19:49:11
139.60.162.176 attackbotsspam
Attempted connection to port 3389.
2020-05-12 19:57:09
49.176.146.35 attackbots
May 12 14:10:46 vpn01 sshd[32035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.176.146.35
May 12 14:10:49 vpn01 sshd[32035]: Failed password for invalid user gray from 49.176.146.35 port 42722 ssh2
...
2020-05-12 20:23:35

Recently Reported IPs

189.32.127.77 21.141.0.31 88.111.67.137 167.222.215.11
13.161.232.245 114.37.145.241 26.199.80.134 176.156.199.172
85.14.214.245 135.172.5.150 139.56.39.123 84.207.253.24
45.112.246.168 14.167.164.111 234.0.86.147 179.18.207.106
103.87.10.9 114.155.167.48 69.38.136.2 244.93.151.89