Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: Bytemark Limited

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.138.113.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5378
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.138.113.145.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041700 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 17 22:13:50 +08 2019
;; MSG SIZE  rcvd: 119

Host info
145.113.138.213.in-addr.arpa domain name pointer supernode.leggewie.org.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
145.113.138.213.in-addr.arpa	name = supernode.leggewie.org.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
212.200.118.98 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-09-05 23:16:18
61.133.122.19 attackbotsspam
Invalid user vbox from 61.133.122.19 port 21912
2020-09-05 23:36:20
112.85.42.173 attackbots
$f2bV_matches
2020-09-05 23:07:30
186.147.160.189 attackspambots
Sep  5 12:58:20 ip106 sshd[12882]: Failed password for root from 186.147.160.189 port 47500 ssh2
...
2020-09-05 23:12:27
212.129.25.123 attackbotsspam
212.129.25.123 - - [05/Sep/2020:14:01:13 +0100] "POST /wp-login.php HTTP/1.1" 200 2238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.129.25.123 - - [05/Sep/2020:14:01:14 +0100] "POST /wp-login.php HTTP/1.1" 200 2282 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.129.25.123 - - [05/Sep/2020:14:01:14 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-05 23:13:03
172.245.58.78 attackbotsspam
(From eric@talkwithwebvisitor.com) Good day, 

My name is Eric and unlike a lot of emails you might get, I wanted to instead provide you with a word of encouragement – Congratulations

What for?  

Part of my job is to check out websites and the work you’ve done with guarinochiropractic.com definitely stands out. 

It’s clear you took building a website seriously and made a real investment of time and resources into making it top quality.

There is, however, a catch… more accurately, a question…

So when someone like me happens to find your site – maybe at the top of the search results (nice job BTW) or just through a random link, how do you know? 

More importantly, how do you make a connection with that person?

Studies show that 7 out of 10 visitors don’t stick around – they’re there one second and then gone with the wind.

Here’s a way to create INSTANT engagement that you may not have known about… 

Talk With Web Visitor is a software widget that’s works on your site, ready to capture
2020-09-05 23:06:42
180.149.126.205 attackspambots
 TCP (SYN) 180.149.126.205:22832 -> port 8081, len 44
2020-09-05 23:25:09
118.24.126.48 attackbotsspam
Invalid user kat from 118.24.126.48 port 54254
2020-09-05 23:24:36
143.204.194.67 attackspambots
TCP Port: 443     invalid blocked  Listed on   zen-spamhaus      Client xx.xx.6.14     (164)
2020-09-05 23:23:25
218.82.244.255 attackbotsspam
Port Scan: TCP/23
2020-09-05 23:46:05
157.245.124.160 attack
Sep  5 15:02:10 instance-2 sshd[25854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.124.160 
Sep  5 15:02:11 instance-2 sshd[25854]: Failed password for invalid user flynn from 157.245.124.160 port 45290 ssh2
Sep  5 15:03:42 instance-2 sshd[25891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.124.160
2020-09-05 23:37:49
171.227.211.78 attackbots
2020-09-04T19:05:14.499376shiva sshd[24469]: Invalid user support from 171.227.211.78 port 54342
2020-09-04T19:05:31.345585shiva sshd[24473]: Invalid user user from 171.227.211.78 port 41560
2020-09-04T19:05:31.697535shiva sshd[24475]: Invalid user operator from 171.227.211.78 port 53560
2020-09-04T19:05:49.780171shiva sshd[24483]: Invalid user user from 171.227.211.78 port 34642
...
2020-09-05 23:47:54
181.60.6.4 attackspam
Sep  4 18:50:11 mellenthin postfix/smtpd[32584]: NOQUEUE: reject: RCPT from unknown[181.60.6.4]: 554 5.7.1 Service unavailable; Client host [181.60.6.4] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/181.60.6.4; from= to= proto=ESMTP helo=
2020-09-05 23:32:00
89.248.167.141 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 8028 proto: tcp cat: Misc Attackbytes: 60
2020-09-05 23:36:03
122.51.169.118 attackspambots
Sep  5 15:05:05 fhem-rasp sshd[32389]: Failed password for root from 122.51.169.118 port 47618 ssh2
Sep  5 15:05:08 fhem-rasp sshd[32389]: Disconnected from authenticating user root 122.51.169.118 port 47618 [preauth]
...
2020-09-05 23:54:10

Recently Reported IPs

77.242.20.190 218.241.81.222 202.166.210.27 103.126.241.43
117.213.183.194 194.61.24.190 175.176.166.145 179.108.82.109
42.115.193.82 113.161.78.226 118.116.105.204 66.251.180.79
46.153.126.246 103.82.127.33 101.50.3.238 211.38.244.205
183.214.69.232 177.79.8.179 87.118.56.240 66.98.69.145