Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.109.244.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36123
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.109.244.145.		IN	A

;; AUTHORITY SECTION:
.			247	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031100 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 12 00:47:05 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 145.244.109.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.244.109.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.32.146.214 attack
Unauthorized connection attempt from IP address 185.32.146.214 on Port 445(SMB)
2019-07-12 07:05:55
139.59.82.78 attackspambots
Jul  6 06:11:31 server sshd\[235813\]: Invalid user wwwadmin from 139.59.82.78
Jul  6 06:11:31 server sshd\[235813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.82.78
Jul  6 06:11:33 server sshd\[235813\]: Failed password for invalid user wwwadmin from 139.59.82.78 port 34796 ssh2
...
2019-07-12 06:39:54
139.59.67.194 attackspam
Automatic report - Web App Attack
2019-07-12 06:49:45
154.209.1.74 attack
Automatic report - Web App Attack
2019-07-12 07:01:40
212.32.199.214 attack
Unauthorized connection attempt from IP address 212.32.199.214 on Port 445(SMB)
2019-07-12 07:22:51
46.227.14.107 attackbots
Sending SPAM email
2019-07-12 07:09:31
37.106.182.230 attack
Unauthorized connection attempt from IP address 37.106.182.230 on Port 445(SMB)
2019-07-12 06:57:50
114.33.135.178 attack
Unauthorized connection attempt from IP address 114.33.135.178 on Port 445(SMB)
2019-07-12 06:59:37
114.99.51.25 attackspam
failed_logins
2019-07-12 06:59:07
139.59.59.187 attack
Jul 11 22:34:54 MK-Soft-VM6 sshd\[19120\]: Invalid user teamspeak3 from 139.59.59.187 port 55192
Jul 11 22:34:54 MK-Soft-VM6 sshd\[19120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.187
Jul 11 22:34:56 MK-Soft-VM6 sshd\[19120\]: Failed password for invalid user teamspeak3 from 139.59.59.187 port 55192 ssh2
...
2019-07-12 07:00:33
23.129.64.170 attack
Jul 11 16:52:23 MK-Soft-VM7 sshd\[14092\]: Invalid user admin1 from 23.129.64.170 port 22343
Jul 11 16:52:23 MK-Soft-VM7 sshd\[14092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.170
Jul 11 16:52:25 MK-Soft-VM7 sshd\[14092\]: Failed password for invalid user admin1 from 23.129.64.170 port 22343 ssh2
...
2019-07-12 06:36:02
31.168.233.70 attackspambots
Unauthorized connection attempt from IP address 31.168.233.70 on Port 445(SMB)
2019-07-12 06:50:07
125.23.5.102 attackspambots
Unauthorized connection attempt from IP address 125.23.5.102 on Port 445(SMB)
2019-07-12 06:57:02
139.59.42.211 attack
Scanning random ports - tries to find possible vulnerable services
2019-07-12 07:05:22
67.211.254.117 attack
Unauthorized connection attempt from IP address 67.211.254.117 on Port 445(SMB)
2019-07-12 06:47:41

Recently Reported IPs

113.109.23.192 113.109.77.42 113.11.251.201 113.11.252.193
113.11.255.30 113.110.134.70 113.110.146.98 113.110.166.252
113.110.168.78 113.110.190.140 113.110.195.174 113.110.196.225
113.110.199.164 113.110.201.249 113.110.212.71 113.110.229.98
113.110.231.24 113.110.234.130 100.171.31.254 113.110.241.66