Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.131.16.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25321
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.131.16.20.			IN	A

;; AUTHORITY SECTION:
.			562	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:16:38 CST 2022
;; MSG SIZE  rcvd: 106
Host info
20.16.131.145.in-addr.arpa domain name pointer arg-pldacl04.amsiohosting.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.16.131.145.in-addr.arpa	name = arg-pldacl04.amsiohosting.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
52.90.135.219 attack
Invalid user venom from 52.90.135.219 port 44946
2020-05-02 06:45:15
91.243.93.14 attackbotsspam
Automatic report - Banned IP Access
2020-05-02 06:28:57
79.138.29.147 attackbots
May  1 22:13:29 debian-2gb-nbg1-2 kernel: \[10622920.782891\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=79.138.29.147 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=33522 PROTO=TCP SPT=3787 DPT=23 WINDOW=12787 RES=0x00 SYN URGP=0
2020-05-02 06:38:12
87.251.74.60 attackbots
May  1 22:13:57 debian-2gb-nbg1-2 kernel: \[10622948.361249\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.60 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=13816 PROTO=TCP SPT=42568 DPT=50607 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-02 06:13:48
59.188.2.19 attack
Invalid user song from 59.188.2.19 port 43442
2020-05-02 06:51:50
182.75.77.38 attack
Invalid user tomas from 182.75.77.38 port 50222
2020-05-02 06:42:08
128.90.54.102 attackbots
IP 128.90.54.102  and IP 89.187.178.143 (listed in your database) both sent Fraudulent Orders using the same address, 26157 Danti Court, Hayward CA 94545 United States. Three different names were used.
2020-05-02 06:52:55
82.64.15.106 attackspambots
May  1 21:59:26 localhost sshd\[3766\]: Invalid user pi from 82.64.15.106 port 49358
May  1 21:59:26 localhost sshd\[3766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.15.106
May  1 21:59:26 localhost sshd\[3764\]: Invalid user pi from 82.64.15.106 port 49356
...
2020-05-02 06:28:22
105.184.203.66 attack
Invalid user balasandhya from 105.184.203.66 port 43376
2020-05-02 06:40:30
114.237.109.8 attackbots
SpamScore above: 10.0
2020-05-02 06:46:47
102.132.232.74 attackspambots
Automatic report - Port Scan Attack
2020-05-02 06:19:53
139.186.68.165 attackspambots
Invalid user deploy from 139.186.68.165 port 15929
2020-05-02 06:18:20
177.155.36.105 attackspam
Automatic report - Port Scan Attack
2020-05-02 06:40:08
195.54.167.13 attackbotsspam
May  2 00:30:08 debian-2gb-nbg1-2 kernel: \[10631118.736521\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.167.13 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=5989 PROTO=TCP SPT=51484 DPT=9584 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-02 06:33:01
82.214.47.39 attackspam
[Aegis] @ 2020-04-28 07:55:59  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2020-05-02 06:29:28

Recently Reported IPs

145.131.1.158 145.131.16.19 145.131.16.32 145.131.16.48
145.131.16.12 145.131.16.14 145.131.16.73 145.131.16.71
145.131.16.94 145.131.16.87 145.131.25.136 145.131.16.97
145.131.16.68 145.131.16.74 145.131.21.56 145.131.25.137
145.131.2.8 145.131.31.20 145.131.41.28 145.131.30.229