Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Cyprus

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.13.132.45 attack
Invalid user james from 45.13.132.45 port 41152
2020-02-18 20:31:53
45.13.132.210 attackbots
Nov 25 06:07:49 m2 sshd[9391]: Invalid user shina from 45.13.132.210
Nov 25 06:07:52 m2 sshd[9391]: Failed password for invalid user shina from 45.13.132.210 port 22315 ssh2
Nov 25 07:05:08 m2 sshd[1198]: Failed password for r.r from 45.13.132.210 port 44858 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.13.132.210
2019-11-25 20:15:05
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.13.132.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58389
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.13.132.157.			IN	A

;; AUTHORITY SECTION:
.			539	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061102 1800 900 604800 86400

;; Query time: 127 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 05:34:55 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 157.132.13.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.132.13.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
93.156.160.74 attackspam
Unauthorized connection attempt detected from IP address 93.156.160.74 to port 5555 [J]
2020-01-19 08:10:25
173.12.107.133 attackbotsspam
Unauthorized connection attempt detected from IP address 173.12.107.133 to port 81 [J]
2020-01-19 08:03:46
112.251.10.234 attackspambots
Unauthorized connection attempt detected from IP address 112.251.10.234 to port 23 [J]
2020-01-19 08:30:15
80.98.32.157 attack
Unauthorized connection attempt detected from IP address 80.98.32.157 to port 81 [J]
2020-01-19 08:33:42
87.6.36.181 attackbotsspam
Unauthorized connection attempt detected from IP address 87.6.36.181 to port 23 [J]
2020-01-19 08:11:53
213.32.75.112 attackspam
2020-01-18T23:47:59.271875shield sshd\[21578\]: Invalid user counter from 213.32.75.112 port 37770
2020-01-18T23:47:59.275244shield sshd\[21578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.75.112
2020-01-18T23:48:01.810349shield sshd\[21578\]: Failed password for invalid user counter from 213.32.75.112 port 37770 ssh2
2020-01-18T23:50:26.564851shield sshd\[22619\]: Invalid user user6 from 213.32.75.112 port 34470
2020-01-18T23:50:26.568224shield sshd\[22619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.75.112
2020-01-19 07:57:52
123.28.118.254 attack
Unauthorized connection attempt detected from IP address 123.28.118.254 to port 80 [J]
2020-01-19 08:25:19
117.51.142.192 attackspambots
Jan 18 19:40:58 server sshd\[23605\]: Invalid user jeroen from 117.51.142.192
Jan 18 19:40:58 server sshd\[23605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.51.142.192 
Jan 18 19:40:59 server sshd\[23605\]: Failed password for invalid user jeroen from 117.51.142.192 port 46766 ssh2
Jan 19 01:05:32 server sshd\[7452\]: Invalid user jitendra from 117.51.142.192
Jan 19 01:05:32 server sshd\[7452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.51.142.192 
...
2020-01-19 08:28:09
188.24.2.13 attackbotsspam
Unauthorized connection attempt detected from IP address 188.24.2.13 to port 81 [J]
2020-01-19 07:59:45
85.72.205.10 attackbotsspam
Unauthorized connection attempt detected from IP address 85.72.205.10 to port 81
2020-01-19 08:12:10
81.158.75.63 attackbots
Unauthorized connection attempt detected from IP address 81.158.75.63 to port 80 [J]
2020-01-19 08:12:27
222.186.42.4 attack
Jan 18 19:15:10 linuxvps sshd\[61213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
Jan 18 19:15:11 linuxvps sshd\[61213\]: Failed password for root from 222.186.42.4 port 65250 ssh2
Jan 18 19:15:27 linuxvps sshd\[61387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
Jan 18 19:15:29 linuxvps sshd\[61387\]: Failed password for root from 222.186.42.4 port 19834 ssh2
Jan 18 19:15:48 linuxvps sshd\[61617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
2020-01-19 08:17:40
103.100.209.108 attackspambots
Jan 19 00:49:24 cp sshd[32663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.209.108
2020-01-19 08:09:24
69.156.208.61 attackbots
Unauthorized connection attempt detected from IP address 69.156.208.61 to port 83 [J]
2020-01-19 08:14:41
190.198.197.60 attack
Unauthorized connection attempt detected from IP address 190.198.197.60 to port 23 [J]
2020-01-19 07:59:21

Recently Reported IPs

34.95.144.46 51.178.76.51 137.226.12.190 173.219.112.85
5.167.64.34 167.172.80.77 112.245.213.131 137.226.12.36
137.226.8.203 137.226.10.58 196.27.128.73 43.154.202.19
137.226.1.98 43.245.160.104 137.226.26.206 137.226.0.5
95.214.54.102 45.125.236.41 137.226.1.188 23.224.146.123