Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aïn Taya

Region: Alger

Country: Algeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.130.168.0 - 45.132.79.255
CIDR:           45.130.176.0/20, 45.130.192.0/18, 45.131.0.0/16, 45.132.64.0/20, 45.132.0.0/18, 45.130.168.0/21
NetName:        RIPE
NetHandle:      NET-45-130-168-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Early Registrations, Transferred to RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2014-05-22
Updated:        2025-02-10
Comment:        These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref:            https://rdap.arin.net/registry/ip/45.130.168.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.130.203.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40316
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.130.203.128.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033101 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 01:30:09 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 128.203.130.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 128.203.130.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.128.225.240 attackspam
Attempted connection to port 3389.
2020-04-08 07:15:21
114.67.104.59 attackspam
(sshd) Failed SSH login from 114.67.104.59 (CN/China/-): 5 in the last 3600 secs
2020-04-08 07:37:05
150.129.108.110 attackspam
Attempted connection to port 445.
2020-04-08 07:16:18
83.61.10.169 attackbotsspam
Fail2Ban Ban Triggered (2)
2020-04-08 07:03:09
89.165.51.121 attackspam
Attempted connection to port 445.
2020-04-08 07:02:52
138.118.4.168 attackspam
2020-04-08T00:47:16.377639  sshd[19474]: Invalid user user from 138.118.4.168 port 39688
2020-04-08T00:47:16.390393  sshd[19474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.118.4.168
2020-04-08T00:47:16.377639  sshd[19474]: Invalid user user from 138.118.4.168 port 39688
2020-04-08T00:47:18.019333  sshd[19474]: Failed password for invalid user user from 138.118.4.168 port 39688 ssh2
...
2020-04-08 07:32:41
103.56.206.231 attackspambots
Apr  8 00:57:42 localhost sshd[16191]: Invalid user production from 103.56.206.231 port 47280
...
2020-04-08 07:39:31
51.158.120.255 attackbots
Apr  7 18:56:01 NPSTNNYC01T sshd[29024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.120.255
Apr  7 18:56:04 NPSTNNYC01T sshd[29024]: Failed password for invalid user postgres from 51.158.120.255 port 33114 ssh2
Apr  7 18:59:39 NPSTNNYC01T sshd[29250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.120.255
...
2020-04-08 07:07:33
220.176.204.91 attackspam
SSH Invalid Login
2020-04-08 07:26:18
183.134.4.52 attackbotsspam
Unauthorized connection attempt from IP address 183.134.4.52 on Port 445(SMB)
2020-04-08 07:17:16
1.63.51.178 attack
Attempted connection to port 2323.
2020-04-08 07:24:08
178.234.143.243 attack
Unauthorized connection attempt from IP address 178.234.143.243 on Port 445(SMB)
2020-04-08 07:06:31
195.206.55.154 attack
Unauthorized connection attempt from IP address 195.206.55.154 on Port 445(SMB)
2020-04-08 07:14:04
188.131.178.32 attackspambots
SSH Invalid Login
2020-04-08 07:29:05
106.52.240.160 attack
SSH Invalid Login
2020-04-08 07:38:18

Recently Reported IPs

2606:4700:10::6814:9002 2606:4700:10::6814:8991 2606:4700:10::6814:7297 2606:4700:10::6816:701
2606:4700:10::6814:8718 2606:4700:10::6816:1518 2606:4700:10::6816:2346 2606:4700:10::6816:4877
2606:4700:10::6814:9848 2606:4700:10::6814:9830 164.155.74.68 2606:4700:10::6814:5968
20.166.39.160 85.217.140.44 31.14.32.8 216.177.164.220
2606:4700:10::6816:4127 2606:4700:10::6816:2831 190.194.63.89 83.214.180.73