Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.45.162.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27997
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.45.162.138.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:38:41 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 138.162.45.131.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 131.45.162.138.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
103.89.89.122 attackbotsspam
SmallBizIT.US 1 packets to tcp(3389)
2020-06-20 20:00:11
183.177.103.138 attackspambots
Unauthorized connection attempt from IP address 183.177.103.138 on Port 445(SMB)
2020-06-20 20:02:16
41.111.130.125 attack
Unauthorized connection attempt from IP address 41.111.130.125 on Port 445(SMB)
2020-06-20 19:39:52
49.234.39.194 attackbotsspam
Jun 20 18:09:41 localhost sshd[2145477]: Connection closed by 49.234.39.194 port 36104 [preauth]
...
2020-06-20 19:41:20
187.188.206.106 attackbots
SSH Login Bruteforce
2020-06-20 19:58:33
106.13.63.114 attackbots
Invalid user silke from 106.13.63.114 port 32914
2020-06-20 19:48:39
14.244.173.53 attackspam
1592632941 - 06/20/2020 08:02:21 Host: 14.244.173.53/14.244.173.53 Port: 445 TCP Blocked
2020-06-20 19:36:48
186.219.136.15 attackspambots
Attempted connection to port 445.
2020-06-20 19:54:05
222.186.169.192 attack
Jun 20 13:36:54 mail sshd[24361]: Failed password for root from 222.186.169.192 port 25156 ssh2
Jun 20 13:36:58 mail sshd[24361]: Failed password for root from 222.186.169.192 port 25156 ssh2
...
2020-06-20 19:52:34
188.134.6.223 attackspambots
Attempted connection to port 80.
2020-06-20 19:53:42
194.53.179.235 attack
Attempted connection to port 80.
2020-06-20 19:52:01
183.91.15.35 attack
Unauthorized connection attempt from IP address 183.91.15.35 on Port 445(SMB)
2020-06-20 19:30:12
34.68.127.147 attackbots
Jun 20 07:18:24 vlre-nyc-1 sshd\[5712\]: Invalid user radius from 34.68.127.147
Jun 20 07:18:24 vlre-nyc-1 sshd\[5712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.68.127.147
Jun 20 07:18:26 vlre-nyc-1 sshd\[5712\]: Failed password for invalid user radius from 34.68.127.147 port 57677 ssh2
Jun 20 07:20:24 vlre-nyc-1 sshd\[5771\]: Invalid user sftp from 34.68.127.147
Jun 20 07:20:24 vlre-nyc-1 sshd\[5771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.68.127.147
Jun 20 07:20:26 vlre-nyc-1 sshd\[5771\]: Failed password for invalid user sftp from 34.68.127.147 port 47377 ssh2
...
2020-06-20 19:29:23
110.232.71.253 attackspam
Unauthorized connection attempt from IP address 110.232.71.253 on Port 445(SMB)
2020-06-20 19:51:11
186.37.121.67 attack
Unauthorized connection attempt from IP address 186.37.121.67 on Port 445(SMB)
2020-06-20 19:58:49

Recently Reported IPs

242.8.180.249 4.5.66.124 179.27.244.94 152.215.215.36
206.38.77.172 240.251.191.116 141.200.43.89 167.4.148.219
61.89.227.175 159.162.2.69 75.224.102.47 189.80.73.127
126.82.170.133 212.18.144.124 82.163.183.208 23.153.68.193
14.13.117.91 199.27.238.36 74.78.91.115 166.229.21.235