Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.40.45.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16259
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.40.45.31.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 09:23:41 CST 2025
;; MSG SIZE  rcvd: 105
Host info
31.45.40.145.in-addr.arpa domain name pointer 145-40-45-31.power-speed.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
31.45.40.145.in-addr.arpa	name = 145-40-45-31.power-speed.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.23.53.172 attackspam
Unauthorized connection attempt from IP address 182.23.53.172 on Port 445(SMB)
2020-09-21 00:26:14
168.70.111.189 attackspambots
Brute-force attempt banned
2020-09-21 00:28:50
79.120.54.174 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-20T14:25:41Z and 2020-09-20T14:33:29Z
2020-09-21 00:38:48
200.146.227.146 attack
Attempted Brute Force (dovecot)
2020-09-21 00:37:33
183.230.248.81 attackbots
Automatic report - Banned IP Access
2020-09-21 00:48:05
139.198.18.231 attack
Sep 20 18:28:30 pve1 sshd[21721]: Failed password for root from 139.198.18.231 port 56634 ssh2
...
2020-09-21 00:50:02
202.121.181.104 attackspambots
Found on   CINS badguys     / proto=6  .  srcport=45290  .  dstport=24271  .     (1934)
2020-09-21 00:17:24
167.248.133.30 attackbotsspam
" "
2020-09-21 00:44:20
187.191.48.116 attackspambots
Unauthorized connection attempt from IP address 187.191.48.116 on Port 445(SMB)
2020-09-21 00:17:35
197.210.84.87 attack
Unauthorized connection attempt from IP address 197.210.84.87 on Port 445(SMB)
2020-09-21 00:40:01
114.35.119.25 attackspam
Auto Detect Rule!
proto TCP (SYN), 114.35.119.25:28299->gjan.info:23, len 40
2020-09-21 00:20:36
103.111.225.18 attackspam
Icarus honeypot on github
2020-09-21 00:19:24
62.32.94.164 attackbots
Unauthorized connection attempt from IP address 62.32.94.164 on Port 445(SMB)
2020-09-21 00:25:20
27.4.171.71 attack
Listed on    dnsbl-sorbs plus abuseat.org and barracudaCentral   / proto=6  .  srcport=42469  .  dstport=23  .     (2294)
2020-09-21 00:33:28
218.161.73.109 attack
 TCP (SYN) 218.161.73.109:17171 -> port 23, len 44
2020-09-21 00:37:01

Recently Reported IPs

118.241.5.142 40.163.165.210 206.46.161.193 250.85.172.205
128.20.104.158 95.80.31.218 82.11.62.134 96.183.29.128
159.17.172.112 39.203.255.157 197.177.158.99 202.247.66.48
3.226.231.122 98.2.29.194 136.49.3.203 67.252.37.46
52.238.187.244 119.108.254.3 85.231.134.128 24.107.121.255