Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.213.145.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43120
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.213.145.137.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 17:29:51 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'Host 137.145.213.117.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 117.213.145.137.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
190.149.162.94 attackbots
Port Scan: TCP/445
2019-09-25 09:40:21
223.99.60.182 attackbotsspam
Port Scan: UDP/34567
2019-09-25 09:28:00
54.39.104.30 attack
Sep 25 04:56:29 ms-srv sshd[34113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.104.30
Sep 25 04:56:31 ms-srv sshd[34113]: Failed password for invalid user bie from 54.39.104.30 port 37142 ssh2
2019-09-25 12:01:10
31.163.163.0 attack
Port Scan: TCP/23
2019-09-25 09:26:44
185.14.251.4 spam
Phishing scam
2019-09-25 11:57:45
134.0.97.53 attackspam
Unauthorised access (Sep 25) SRC=134.0.97.53 LEN=40 TTL=56 ID=46534 TCP DPT=8080 WINDOW=40724 SYN 
Unauthorised access (Sep 24) SRC=134.0.97.53 LEN=40 TTL=56 ID=26454 TCP DPT=8080 WINDOW=40257 SYN
2019-09-25 09:43:57
188.16.145.117 attackbots
port 23 attempt blocked
2019-09-25 09:41:10
66.220.155.135 attack
Port Scan: TCP/25
2019-09-25 09:48:38
5.189.145.24 attack
Port Scan: TCP/443
2019-09-25 09:27:30
177.37.77.64 attackbots
Sep 25 03:01:16 localhost sshd\[22585\]: Invalid user matias from 177.37.77.64 port 35950
Sep 25 03:01:16 localhost sshd\[22585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.37.77.64
Sep 25 03:01:19 localhost sshd\[22585\]: Failed password for invalid user matias from 177.37.77.64 port 35950 ssh2
2019-09-25 09:17:47
45.86.74.121 attackbots
Sep 24 23:56:33 plusreed sshd[19110]: Invalid user conf from 45.86.74.121
...
2019-09-25 12:00:24
114.239.172.65 attackbotsspam
Port Scan: TCP/25
2019-09-25 09:21:48
64.130.98.30 attackspambots
Port Scan: UDP/137
2019-09-25 09:25:28
86.160.212.54 attackspambots
Port Scan: TCP/23
2019-09-25 09:23:06
185.243.182.56 attack
Port Scan: TCP/25
2019-09-25 09:32:39

Recently Reported IPs

175.190.6.87 20.208.82.43 236.130.88.58 99.236.101.88
155.22.14.13 6.220.115.7 191.27.98.75 77.215.162.101
182.201.184.18 43.40.177.150 107.160.115.169 188.38.7.251
139.226.247.66 5.223.165.98 114.144.52.71 246.132.104.167
122.31.245.190 96.164.78.172 203.58.25.214 17.166.229.91