Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.145.132.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2872
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;31.145.132.99.			IN	A

;; AUTHORITY SECTION:
.			270	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 05:33:52 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 99.132.145.31.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.132.145.31.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.197.160.139 attackbots
Invalid user pi from 112.197.160.139 port 52202
2020-07-01 12:46:28
159.192.97.144 attackspam
Unauthorized connection attempt from IP address 159.192.97.144 on Port 445(SMB)
2020-07-01 12:35:04
110.137.177.17 attackspam
[portscan] tcp/23 [TELNET]
*(RWIN=54242)(06301147)
2020-07-01 12:59:00
81.214.85.207 attackspambots
Unauthorized connection attempt detected from IP address 81.214.85.207 to port 26
2020-07-01 12:58:16
211.253.129.225 attackbotsspam
Multiple SSH authentication failures from 211.253.129.225
2020-07-01 12:36:16
201.234.195.154 attackspam
Unauthorized connection attempt detected from IP address 201.234.195.154 to port 3389
2020-07-01 12:27:51
170.106.36.56 attackbotsspam
unauthorized connection attempt
2020-07-01 12:55:02
104.248.1.92 attackspambots
Multiple SSH authentication failures from 104.248.1.92
2020-07-01 13:04:03
106.13.227.19 attackspambots
Multiple SSH authentication failures from 106.13.227.19
2020-07-01 12:39:28
202.88.216.242 attackspambots
 TCP (SYN) 202.88.216.242:58627 -> port 23, len 44
2020-07-01 12:33:22
36.34.77.100 attackspambots
1593536784 - 06/30/2020 19:06:24 Host: 36.34.77.100/36.34.77.100 Port: 23 TCP Blocked
2020-07-01 13:08:06
175.202.32.78 attack
Unauthorized connection attempt detected from IP address 175.202.32.78 to port 5555
2020-07-01 13:02:46
93.148.0.91 attackbotsspam
...
2020-07-01 13:11:58
80.82.77.245 attackbotsspam
80.82.77.245 was recorded 8 times by 5 hosts attempting to connect to the following ports: 2054,1794,1718. Incident counter (4h, 24h, all-time): 8, 55, 24758
2020-07-01 13:00:42
141.98.9.157 attack
Brute-force attempt banned
2020-07-01 12:37:34

Recently Reported IPs

123.8.27.66 60.246.119.56 95.78.208.194 164.163.166.1
217.74.172.157 79.7.94.180 185.88.100.189 85.100.127.224
78.189.154.93 78.140.195.66 159.242.104.194 189.207.28.95
153.232.212.118 91.121.88.53 86.98.142.66 101.0.49.50
5.165.189.157 104.238.111.161 115.61.43.70 93.69.91.184