Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sōka Shi

Region: Saitama

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.139.232.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30435
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.139.232.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 16:02:53 CST 2025
;; MSG SIZE  rcvd: 107
Host info
45.232.139.163.in-addr.arpa domain name pointer 163-139-232-45.rv.vectant.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.232.139.163.in-addr.arpa	name = 163-139-232-45.rv.vectant.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
210.68.40.128 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-02-24 08:08:05
216.204.174.226 attack
Scanning random ports - tries to find possible vulnerable services
2020-02-24 07:55:02
216.218.206.101 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2020-02-24 07:52:56
213.139.56.196 attack
Scanning random ports - tries to find possible vulnerable services
2020-02-24 07:57:08
218.65.162.26 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2020-02-24 07:48:04
201.116.134.132 attack
Scanning random ports - tries to find possible vulnerable services
2020-02-24 08:22:20
45.76.191.137 attackspam
WordPress brute force
2020-02-24 08:05:12
217.92.241.221 attackspam
Scanning random ports - tries to find possible vulnerable services
2020-02-24 07:50:25
45.143.222.141 spamattack
[2020/02/24 00:57:01] [45.143.222.141:28191] User @luxnetcorp.com.tw login failed.
[2020/02/24 00:57:02] [45.143.222.141:28320] User @luxnetcorp.com.tw login failed.
[2020/02/24 00:57:02] [45.143.222.141:28321] User shao@luxnetcorp.com.tw login failed.
[2020/02/24 00:57:04] [45.143.222.141:28330] User shao@luxnetcorp.com.tw login failed.
[2020/02/24 00:57:04] [45.143.222.141:28327] User @luxnetcorp.com.tw login failed.
[2020/02/24 00:57:05] [45.143.222.141:28337] User @luxnetcorp.com.tw login failed.
2020-02-24 08:22:51
201.122.221.164 attackspam
Scanning random ports - tries to find possible vulnerable services
2020-02-24 08:21:54
203.99.58.185 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-02-24 08:13:55
201.238.247.234 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2020-02-24 08:19:42
216.218.206.115 attackspam
Scanning random ports - tries to find possible vulnerable services
2020-02-24 07:52:12
217.59.135.2 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-02-24 07:51:19
201.72.214.214 attackbots
445/tcp
[2020-02-23]1pkt
2020-02-24 08:22:41

Recently Reported IPs

44.46.78.179 214.181.52.56 2.144.99.87 190.215.237.212
196.86.125.148 212.159.102.220 82.157.132.11 7.237.107.40
156.132.71.1 201.255.212.253 168.59.63.177 2.39.246.107
231.76.244.8 103.45.85.115 99.206.211.10 144.230.194.101
234.118.5.29 123.207.76.68 140.176.69.80 155.176.1.26