Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.245.3.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49192
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.245.3.5.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:49:50 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 5.3.245.161.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 161.245.3.5.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
134.209.110.62 attack
Brute force SMTP login attempted.
...
2019-08-10 05:59:01
134.175.39.246 attackspam
Brute force SMTP login attempted.
...
2019-08-10 06:19:08
184.105.247.216 attack
firewall-block, port(s): 5900/tcp
2019-08-10 06:28:55
185.200.118.79 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-10 06:14:32
134.175.13.213 attackbotsspam
Brute force SMTP login attempted.
...
2019-08-10 06:41:51
119.166.33.44 attackbots
Telnetd brute force attack detected by fail2ban
2019-08-10 06:26:23
121.234.44.157 attackspam
SSH-BruteForce
2019-08-10 06:40:31
134.209.100.31 attackbots
Brute force SMTP login attempted.
...
2019-08-10 06:02:25
193.233.157.129 attack
Fail2Ban Ban Triggered
2019-08-10 06:17:15
218.92.0.147 attack
Aug  9 19:31:16 [munged] sshd[11767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.147  user=root
Aug  9 19:31:16 [munged] sshd[11769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.147  user=root
2019-08-10 06:10:05
204.111.241.83 attackbots
2019-08-09T17:30:48.488596abusebot-3.cloudsearch.cf sshd\[22542\]: Invalid user pi from 204.111.241.83 port 35900
2019-08-10 06:29:58
134.209.107.193 attackbots
Brute force SMTP login attempted.
...
2019-08-10 06:01:14
74.82.47.3 attackspambots
scan z
2019-08-10 06:07:56
134.209.116.148 attackbots
Brute force SMTP login attempted.
...
2019-08-10 05:58:08
189.91.5.46 attack
libpam_shield report: forced login attempt
2019-08-10 06:31:02

Recently Reported IPs

66.102.6.64 212.87.204.45 220.45.184.69 108.70.238.67
12.163.123.137 88.1.237.35 93.111.165.18 29.155.191.38
203.212.44.57 42.136.180.44 123.34.255.183 91.160.190.109
198.45.32.191 193.97.230.32 107.82.182.82 252.172.103.130
134.29.50.77 185.226.5.1 180.7.76.193 164.93.174.130