Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.113.101.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24769
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.113.101.213.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 18:38:49 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 213.101.113.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 213.101.113.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
183.89.3.189 attackspam
Unauthorized connection attempt from IP address 183.89.3.189 on Port 445(SMB)
2020-05-30 18:40:13
188.137.73.229 attackbots
Unauthorized connection attempt from IP address 188.137.73.229 on Port 445(SMB)
2020-05-30 18:42:06
106.13.175.126 attackspambots
Invalid user admin from 106.13.175.126 port 40248
2020-05-30 18:47:46
185.94.192.84 attack
Attempts spam post to comment form - stupid bot.
2020-05-30 18:52:17
79.126.130.42 attackbots
Attempted connection to port 8080.
2020-05-30 19:04:04
69.11.55.144 attackspam
May 30 07:11:15 game-panel sshd[7001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.11.55.144
May 30 07:11:17 game-panel sshd[7001]: Failed password for invalid user ben from 69.11.55.144 port 46194 ssh2
May 30 07:15:12 game-panel sshd[7218]: Failed password for root from 69.11.55.144 port 52834 ssh2
2020-05-30 18:48:18
220.133.23.205 attack
Unauthorised access (May 30) SRC=220.133.23.205 LEN=40 TTL=45 ID=4995 TCP DPT=23 WINDOW=39722 SYN
2020-05-30 18:39:45
49.88.112.55 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-05-30 18:44:16
94.99.99.60 attack
Unauthorized connection attempt from IP address 94.99.99.60 on Port 445(SMB)
2020-05-30 19:01:35
200.5.55.199 attack
Unauthorized connection attempt from IP address 200.5.55.199 on Port 445(SMB)
2020-05-30 18:56:33
101.175.106.24 attack
Exploit Attempt
2020-05-30 18:38:41
218.79.121.237 attack
Unauthorized connection attempt from IP address 218.79.121.237 on Port 445(SMB)
2020-05-30 18:42:41
178.62.104.58 attack
Invalid user test from 178.62.104.58 port 44686
2020-05-30 18:58:40
222.124.202.76 attackspam
Unauthorized connection attempt from IP address 222.124.202.76 on Port 445(SMB)
2020-05-30 18:50:45
203.241.248.18 attack
Attempted connection to port 1433.
2020-05-30 18:34:10

Recently Reported IPs

53.107.47.24 135.7.37.43 43.86.236.164 139.197.51.146
174.117.91.120 47.249.36.138 224.5.146.128 89.147.253.76
251.102.91.147 145.0.222.69 156.18.43.109 41.147.186.136
157.55.106.149 40.22.247.160 117.24.45.61 241.202.29.52
45.26.195.2 190.90.250.162 169.73.178.137 208.150.178.14