Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.112.132.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6381
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.112.132.5.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:56:03 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 5.132.112.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.132.112.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.19.179.99 attack
Attempted connection to port 8080.
2020-09-07 19:50:36
132.255.148.209 attackbotsspam
Unauthorized connection attempt from IP address 132.255.148.209 on Port 445(SMB)
2020-09-07 19:20:59
77.79.134.84 attackbots
Unauthorized connection attempt from IP address 77.79.134.84 on Port 445(SMB)
2020-09-07 19:41:22
49.48.220.120 attackspambots
Unauthorized connection attempt from IP address 49.48.220.120 on Port 445(SMB)
2020-09-07 19:58:08
93.174.93.195 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-09-07 19:36:57
113.169.198.173 attack
Unauthorized connection attempt from IP address 113.169.198.173 on Port 445(SMB)
2020-09-07 19:53:40
154.220.96.130 attackspambots
[MK-Root1] SSH login failed
2020-09-07 19:38:24
170.80.10.104 attack
1599434931 - 09/07/2020 01:28:51 Host: 170.80.10.104/170.80.10.104 Port: 445 TCP Blocked
2020-09-07 19:42:54
85.67.98.102 attack
Attempted connection to port 22.
2020-09-07 19:40:38
41.39.81.242 attackspam
Attempted connection to port 445.
2020-09-07 19:43:21
103.100.173.154 attackbotsspam
Attempted connection to port 445.
2020-09-07 19:58:37
177.0.138.98 attackbots
Cluster member 67.227.229.95 (US/United States/host.cjthedj97.me) said, DENY 177.0.138.98, Reason:[(sshd) Failed SSH login from 177.0.138.98 (BR/Brazil/177-0-138-98.user3p.brasiltelecom.net.br): 1 in the last 3600 secs]; Ports: *; Direction: inout; Trigger: LF_CLUSTER
2020-09-07 19:32:25
86.154.70.94 attack
Unauthorised access (Sep  7) SRC=86.154.70.94 LEN=44 TTL=54 ID=20449 TCP DPT=8080 WINDOW=48916 SYN
2020-09-07 19:39:12
51.254.220.20 attackspam
2020-09-07 03:10:55 wonderland sshd[28180]: Disconnected from invalid user root 51.254.220.20 port 33756 [preauth]
2020-09-07 20:01:34
112.197.70.132 attack
Attempted connection to port 445.
2020-09-07 19:54:37

Recently Reported IPs

125.39.136.53 195.221.141.73 49.128.102.157 213.38.189.234
74.119.93.67 30.34.74.154 46.172.34.25 240.145.50.14
8.238.54.141 40.195.170.253 202.77.32.162 207.120.244.235
196.216.169.96 192.163.65.191 204.80.229.253 38.73.241.67
144.147.235.155 134.167.230.203 170.35.158.232 194.222.102.218