Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       136.245.144.0 - 136.245.255.255
CIDR:           136.245.160.0/19, 136.245.192.0/18, 136.245.144.0/20
NetName:        ROSEVILLE
NetHandle:      NET-136-245-144-0-1
Parent:         NET136 (NET-136-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   City of Roseville (CITYOF-2)
RegDate:        1989-10-05
Updated:        2025-07-18
Comment:        City of Roseville, CA website
Ref:            https://rdap.arin.net/registry/ip/136.245.144.0


OrgName:        City of Roseville
OrgId:          CITYOF-2
Address:        316 Vernon Street Suite 300
City:           Roseville
StateProv:      CA
PostalCode:     95678
Country:        US
RegDate:        1989-10-05
Updated:        2017-12-01
Ref:            https://rdap.arin.net/registry/entity/CITYOF-2


OrgTechHandle: HOSTM929-ARIN
OrgTechName:   Hostmaster
OrgTechPhone:  +1-916-774-5151 
OrgTechEmail:  hostmaster@roseville.ca.us
OrgTechRef:    https://rdap.arin.net/registry/entity/HOSTM929-ARIN

OrgAbuseHandle: HOSTM929-ARIN
OrgAbuseName:   Hostmaster
OrgAbusePhone:  +1-916-774-5151 
OrgAbuseEmail:  hostmaster@roseville.ca.us
OrgAbuseRef:    https://rdap.arin.net/registry/entity/HOSTM929-ARIN

OrgNOCHandle: HOSTM929-ARIN
OrgNOCName:   Hostmaster
OrgNOCPhone:  +1-916-774-5151 
OrgNOCEmail:  hostmaster@roseville.ca.us
OrgNOCRef:    https://rdap.arin.net/registry/entity/HOSTM929-ARIN

RAbuseHandle: HOSTM929-ARIN
RAbuseName:   Hostmaster
RAbusePhone:  +1-916-774-5151 
RAbuseEmail:  hostmaster@roseville.ca.us
RAbuseRef:    https://rdap.arin.net/registry/entity/HOSTM929-ARIN

RNOCHandle: HOSTM929-ARIN
RNOCName:   Hostmaster
RNOCPhone:  +1-916-774-5151 
RNOCEmail:  hostmaster@roseville.ca.us
RNOCRef:    https://rdap.arin.net/registry/entity/HOSTM929-ARIN

RTechHandle: HOSTM929-ARIN
RTechName:   Hostmaster
RTechPhone:  +1-916-774-5151 
RTechEmail:  hostmaster@roseville.ca.us
RTechRef:    https://rdap.arin.net/registry/entity/HOSTM929-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.245.196.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44028
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.245.196.25.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041301 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 14 10:37:00 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 25.196.245.136.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 25.196.245.136.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
14.161.45.187 attackspambots
Feb 29 08:22:00 silence02 sshd[25976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.45.187
Feb 29 08:22:02 silence02 sshd[25976]: Failed password for invalid user guoyifan from 14.161.45.187 port 36942 ssh2
Feb 29 08:27:31 silence02 sshd[26219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.45.187
2020-02-29 15:28:57
36.92.89.242 attack
Unauthorized connection attempt from IP address 36.92.89.242 on Port 445(SMB)
2020-02-29 15:25:48
94.102.53.10 attackbotsspam
02/29/2020-02:03:14.222571 94.102.53.10 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-29 15:04:17
86.171.72.171 attackspambots
1582955069 - 02/29/2020 06:44:29 Host: 86.171.72.171/86.171.72.171 Port: 8080 TCP Blocked
2020-02-29 15:23:49
177.1.214.84 attack
Feb 29 03:37:40 ws24vmsma01 sshd[158101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.214.84
Feb 29 03:37:42 ws24vmsma01 sshd[158101]: Failed password for invalid user appimgr from 177.1.214.84 port 14881 ssh2
...
2020-02-29 15:22:40
112.133.243.23 attack
SMB Server BruteForce Attack
2020-02-29 15:20:38
45.143.220.164 attack
[2020-02-29 02:14:43] NOTICE[1148] chan_sip.c: Registration from '"100501" ' failed for '45.143.220.164:5702' - Wrong password
[2020-02-29 02:14:43] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-29T02:14:43.872-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="100501",SessionID="0x7fd82c81c298",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.164/5702",Challenge="0cb31305",ReceivedChallenge="0cb31305",ReceivedHash="188888e132c3469d0214a98807317db4"
[2020-02-29 02:14:43] NOTICE[1148] chan_sip.c: Registration from '"100501" ' failed for '45.143.220.164:5702' - Wrong password
[2020-02-29 02:14:43] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-29T02:14:43.978-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="100501",SessionID="0x7fd82c39c1e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddre
...
2020-02-29 15:33:30
113.184.100.26 attack
Automatic report - Port Scan Attack
2020-02-29 15:28:07
211.36.213.68 attack
[portscan] Port scan
2020-02-29 15:22:27
118.24.140.195 attack
Feb 29 02:44:55 vps46666688 sshd[19512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.140.195
Feb 29 02:44:58 vps46666688 sshd[19512]: Failed password for invalid user gituser from 118.24.140.195 port 42372 ssh2
...
2020-02-29 14:58:38
113.187.57.150 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 15:14:06
192.241.225.162 attackbots
192.241.225.162 - - [29/Feb/2020:05:44:19 +0000] "GET / HTTP/1.1" 403 153 "-" "Mozilla/5.0 zgrab/0.x"
2020-02-29 15:31:32
131.255.191.4 attackspam
Feb 29 06:56:34 v22018076622670303 sshd\[23058\]: Invalid user couch from 131.255.191.4 port 51438
Feb 29 06:56:34 v22018076622670303 sshd\[23058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.255.191.4
Feb 29 06:56:35 v22018076622670303 sshd\[23058\]: Failed password for invalid user couch from 131.255.191.4 port 51438 ssh2
...
2020-02-29 14:52:34
113.183.183.37 attackbotsspam
Port probing on unauthorized port 23
2020-02-29 15:32:09
177.136.212.35 attackspambots
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-02-29 15:22:59

Recently Reported IPs

241.192.143.8 182.237.78.54 222.89.85.68 2606:4700:10::ac43:2074
2606:4700:10::6814:5331 2606:4700:10::6816:3269 60.211.203.6 60.211.251.226
155.229.50.163 212.47.78.118 122.193.247.93 2606:4700:10::6816:2424
2606:4700:10::6814:5438 2606:4700:10::6814:7387 2606:4700:10::6814:8638 2606:4700:10::6814:8504
2606:4700:10::6814:5728 2606:4700:10::6816:4884 2606:4700:10::6814:5396 108.162.198.37