Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.64.39.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41953
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.64.39.195.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 02:20:11 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 195.39.64.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 195.39.64.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.172.65.41 attackbots
[portscan] tcp/88 [Kerberos]
*(RWIN=1024)(07091133)
2019-07-09 18:02:19
84.245.71.117 attackbots
Jul  9 07:14:54 core01 sshd\[17828\]: Invalid user manoj from 84.245.71.117 port 39574
Jul  9 07:14:54 core01 sshd\[17828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.245.71.117
...
2019-07-09 18:24:09
67.213.75.130 attack
Jul  9 10:27:41 tux-35-217 sshd\[20853\]: Invalid user tecnica from 67.213.75.130 port 13095
Jul  9 10:27:41 tux-35-217 sshd\[20853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.213.75.130
Jul  9 10:27:42 tux-35-217 sshd\[20853\]: Failed password for invalid user tecnica from 67.213.75.130 port 13095 ssh2
Jul  9 10:30:50 tux-35-217 sshd\[20871\]: Invalid user zj from 67.213.75.130 port 9190
Jul  9 10:30:50 tux-35-217 sshd\[20871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.213.75.130
...
2019-07-09 17:25:41
46.101.1.198 attack
Jul  9 12:04:18 MK-Soft-Root1 sshd\[1314\]: Invalid user vnc from 46.101.1.198 port 49715
Jul  9 12:04:18 MK-Soft-Root1 sshd\[1314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.1.198
Jul  9 12:04:21 MK-Soft-Root1 sshd\[1314\]: Failed password for invalid user vnc from 46.101.1.198 port 49715 ssh2
...
2019-07-09 18:16:14
200.14.55.194 attack
Return-Path: 
2019-07-09 18:13:07
82.209.203.5 attackspambots
(imapd) Failed IMAP login from 82.209.203.5 (BY/Belarus/mm-5-203-209-82.static.mgts.by): 1 in the last 3600 secs
2019-07-09 18:27:34
66.191.0.147 attackspambots
$f2bV_matches
2019-07-09 17:43:56
41.205.8.168 attackbots
2019-07-09T05:19:34.496967 X postfix/smtpd[58997]: NOQUEUE: reject: RCPT from unknown[41.205.8.168]: 554 5.7.1 Service unavailable; Client host [41.205.8.168] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/41.205.8.168; from= to= proto=ESMTP helo=
2019-07-09 18:14:52
37.120.135.221 attackbotsspam
\[2019-07-09 06:07:36\] NOTICE\[13443\] chan_sip.c: Registration from '\' failed for '37.120.135.221:1205' - Wrong password
\[2019-07-09 06:07:36\] SECURITY\[13451\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-09T06:07:36.855-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="13769",SessionID="0x7f02f876b078",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.120.135.221/58441",Challenge="1050b7a0",ReceivedChallenge="1050b7a0",ReceivedHash="974dee17900828eb23ad97f2ef6000d0"
\[2019-07-09 06:08:36\] NOTICE\[13443\] chan_sip.c: Registration from '\' failed for '37.120.135.221:1209' - Wrong password
\[2019-07-09 06:08:36\] SECURITY\[13451\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-09T06:08:36.116-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="9116",SessionID="0x7f02f85a4d78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37
2019-07-09 18:08:42
2.50.146.247 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 12:40:20,080 INFO [shellcode_manager] (2.50.146.247) no match, writing hexdump (581c034b7031ce4a9b769e0201542992 :2468582) - MS17010 (EternalBlue)
2019-07-09 17:22:37
149.202.77.77 attack
Tries to gain access to [../../../../../../../../../etc/passwd]
2019-07-09 17:23:48
181.114.149.209 attack
Jul  9 05:20:35 legacy sshd[7028]: Failed password for root from 181.114.149.209 port 57101 ssh2
Jul  9 05:20:46 legacy sshd[7028]: error: maximum authentication attempts exceeded for root from 181.114.149.209 port 57101 ssh2 [preauth]
Jul  9 05:20:55 legacy sshd[7035]: Failed password for root from 181.114.149.209 port 57112 ssh2
...
2019-07-09 17:50:16
136.243.70.151 attackspam
20 attempts against mh-misbehave-ban on tree.magehost.pro
2019-07-09 17:29:31
177.102.18.62 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 12:40:15,383 INFO [shellcode_manager] (177.102.18.62) no match, writing hexdump (ca9a7735ad684f021d9bacc046e5f7a6 :2075044) - MS17010 (EternalBlue)
2019-07-09 17:28:39
85.237.63.124 attack
email spam
2019-07-09 18:02:51

Recently Reported IPs

81.224.253.226 189.48.206.55 156.35.189.222 37.77.130.91
196.210.224.51 39.195.116.88 184.101.30.39 5.23.57.81
218.134.131.102 80.171.106.152 93.94.214.137 135.63.247.223
164.220.178.61 15.114.241.64 80.126.81.196 168.141.34.89
197.41.254.236 163.223.60.219 239.173.41.59 249.89.111.211