Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Tanzania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.45.131.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.45.131.108.			IN	A

;; AUTHORITY SECTION:
.			176	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010300 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 04 00:28:34 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 108.131.45.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 108.131.45.196.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.65.195.228 attackspambots
445/tcp
[2019-08-15]1pkt
2019-08-16 08:14:10
89.201.5.167 attack
Aug 16 01:29:59 mail sshd\[19839\]: Invalid user hlds from 89.201.5.167 port 43504
Aug 16 01:29:59 mail sshd\[19839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.201.5.167
...
2019-08-16 08:40:16
167.71.91.207 attackspambots
xmlrpc attack
2019-08-16 08:21:14
51.38.51.200 attack
Aug 16 01:35:03 cp sshd[21781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.51.200
2019-08-16 08:31:43
138.68.111.27 attack
Aug 16 01:17:58 microserver sshd[52256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.111.27  user=root
Aug 16 01:18:00 microserver sshd[52256]: Failed password for root from 138.68.111.27 port 54712 ssh2
Aug 16 01:22:07 microserver sshd[52924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.111.27  user=mail
Aug 16 01:22:08 microserver sshd[52924]: Failed password for mail from 138.68.111.27 port 46370 ssh2
Aug 16 01:26:11 microserver sshd[53554]: Invalid user choi from 138.68.111.27 port 38032
Aug 16 01:38:22 microserver sshd[55714]: Invalid user landscape from 138.68.111.27 port 13006
Aug 16 01:38:22 microserver sshd[55714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.111.27
Aug 16 01:38:23 microserver sshd[55714]: Failed password for invalid user landscape from 138.68.111.27 port 13006 ssh2
Aug 16 01:42:30 microserver sshd[56363]: Invalid user client from 138
2019-08-16 08:05:09
106.13.74.162 attack
Aug 16 00:54:26 debian sshd\[1789\]: Invalid user admin from 106.13.74.162 port 38816
Aug 16 00:54:26 debian sshd\[1789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.74.162
...
2019-08-16 08:29:05
52.136.238.53 attackbotsspam
Automatic report - Banned IP Access
2019-08-16 08:23:55
49.88.112.66 attack
Aug 15 14:28:36 kapalua sshd\[16642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.66  user=root
Aug 15 14:28:38 kapalua sshd\[16642\]: Failed password for root from 49.88.112.66 port 20258 ssh2
Aug 15 14:28:40 kapalua sshd\[16642\]: Failed password for root from 49.88.112.66 port 20258 ssh2
Aug 15 14:28:42 kapalua sshd\[16642\]: Failed password for root from 49.88.112.66 port 20258 ssh2
Aug 15 14:29:46 kapalua sshd\[16757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.66  user=root
2019-08-16 08:42:56
165.227.214.163 attackbotsspam
Aug 15 14:02:22 lcdev sshd\[3933\]: Invalid user joshua from 165.227.214.163
Aug 15 14:02:22 lcdev sshd\[3933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.214.163
Aug 15 14:02:24 lcdev sshd\[3933\]: Failed password for invalid user joshua from 165.227.214.163 port 48456 ssh2
Aug 15 14:06:46 lcdev sshd\[4348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.214.163  user=root
Aug 15 14:06:48 lcdev sshd\[4348\]: Failed password for root from 165.227.214.163 port 41761 ssh2
2019-08-16 08:18:33
189.58.20.161 attackspam
Automatic report - Port Scan Attack
2019-08-16 08:47:30
177.97.188.45 attackspambots
23/tcp
[2019-08-15]1pkt
2019-08-16 08:20:51
203.29.27.64 attackbots
445/tcp
[2019-08-15]1pkt
2019-08-16 08:04:36
41.223.142.211 attackspam
Invalid user master from 41.223.142.211 port 59616
2019-08-16 08:46:06
95.181.42.186 attackspambots
23/tcp
[2019-08-15]1pkt
2019-08-16 08:19:41
209.141.51.150 attackspambots
(sshd) Failed SSH login from 209.141.51.150 (nevada.tor-relay.host): 5 in the last 3600 secs
2019-08-16 08:28:48

Recently Reported IPs

2.34.21.229 192.46.148.95 197.122.188.27 192.246.184.148
185.47.114.187 178.203.74.84 168.87.217.213 162.245.139.83
161.207.128.150 146.208.119.239 15.192.192.253 141.46.94.150
139.214.232.137 137.213.199.85 133.243.48.196 11.54.86.212
103.44.84.145 103.112.66.68 102.175.88.32 111.90.149.150