Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aïn Taya

Region: Alger

Country: Algeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.130.168.0 - 45.132.79.255
CIDR:           45.132.0.0/18, 45.130.168.0/21, 45.131.0.0/16, 45.130.192.0/18, 45.132.64.0/20, 45.130.176.0/20
NetName:        RIPE
NetHandle:      NET-45-130-168-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Early Registrations, Transferred to RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2014-05-22
Updated:        2025-02-10
Comment:        These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref:            https://rdap.arin.net/registry/ip/45.130.168.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.130.203.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13939
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.130.203.132.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033101 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 01:30:07 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 132.203.130.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.203.130.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.91.127.201 attack
Jul 11 08:35:24 h2865660 sshd[6427]: Invalid user magic from 51.91.127.201 port 50492
Jul 11 08:35:24 h2865660 sshd[6427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.127.201
Jul 11 08:35:24 h2865660 sshd[6427]: Invalid user magic from 51.91.127.201 port 50492
Jul 11 08:35:26 h2865660 sshd[6427]: Failed password for invalid user magic from 51.91.127.201 port 50492 ssh2
Jul 11 08:46:03 h2865660 sshd[6901]: Invalid user xieangji from 51.91.127.201 port 34942
...
2020-07-11 15:22:26
152.136.165.25 attackspam
Invalid user brian from 152.136.165.25 port 46374
2020-07-11 15:20:54
128.199.197.228 attackspam
$f2bV_matches
2020-07-11 15:33:09
51.68.31.223 attack
From return-leonir.tsi=toptec.net.br@diversosplanos.we.bs Fri Jul 10 20:54:49 2020
Received: from divplan-mx-4.diversosplanos.we.bs ([51.68.31.223]:43289)
2020-07-11 15:00:33
78.128.113.226 attackspambots
Jul 11 05:54:48 vpn01 sshd[3485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.128.113.226
Jul 11 05:54:51 vpn01 sshd[3485]: Failed password for invalid user ubnt from 78.128.113.226 port 55454 ssh2
...
2020-07-11 14:55:57
82.64.249.236 attackbots
Invalid user courier from 82.64.249.236 port 46936
2020-07-11 15:06:51
192.241.235.219 attackspam
" "
2020-07-11 14:58:54
198.98.51.89 attackspam
DATE:2020-07-11 05:54:29, IP:198.98.51.89, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-07-11 15:08:27
191.53.238.180 attackspam
(smtpauth) Failed SMTP AUTH login from 191.53.238.180 (BR/Brazil/191-53-238-180.ptu-wr.mastercabo.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-11 08:24:13 plain authenticator failed for ([191.53.238.180]) [191.53.238.180]: 535 Incorrect authentication data (set_id=info@nazhvangiah.com)
2020-07-11 15:16:00
77.40.2.29 attackspambots
(smtpauth) Failed SMTP AUTH login from 77.40.2.29 (RU/Russia/29.2.dialup.mari-el.ru): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-11 08:23:58 plain authenticator failed for (localhost) [77.40.2.29]: 535 Incorrect authentication data (set_id=webmaster@mehrbaft.com)
2020-07-11 15:25:00
155.138.136.138 attack
Bad user agent
2020-07-11 15:09:15
60.222.233.208 attackbots
$lgm
2020-07-11 15:01:12
220.149.227.105 attack
2020-07-11T07:43:31.154209galaxy.wi.uni-potsdam.de sshd[11254]: Invalid user rosanna from 220.149.227.105 port 54427
2020-07-11T07:43:31.156412galaxy.wi.uni-potsdam.de sshd[11254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.149.227.105
2020-07-11T07:43:31.154209galaxy.wi.uni-potsdam.de sshd[11254]: Invalid user rosanna from 220.149.227.105 port 54427
2020-07-11T07:43:32.979372galaxy.wi.uni-potsdam.de sshd[11254]: Failed password for invalid user rosanna from 220.149.227.105 port 54427 ssh2
2020-07-11T07:46:20.074436galaxy.wi.uni-potsdam.de sshd[11528]: Invalid user news from 220.149.227.105 port 46133
2020-07-11T07:46:20.076851galaxy.wi.uni-potsdam.de sshd[11528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.149.227.105
2020-07-11T07:46:20.074436galaxy.wi.uni-potsdam.de sshd[11528]: Invalid user news from 220.149.227.105 port 46133
2020-07-11T07:46:22.437718galaxy.wi.uni-potsdam.de sshd[1152
...
2020-07-11 15:33:27
196.15.211.92 attackspam
Jul 11 10:24:38 gw1 sshd[16653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.15.211.92
Jul 11 10:24:39 gw1 sshd[16653]: Failed password for invalid user gaby from 196.15.211.92 port 46402 ssh2
...
2020-07-11 15:19:46
35.197.244.51 attackbots
Jul 11 06:59:45 backup sshd[30078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.197.244.51 
Jul 11 06:59:46 backup sshd[30078]: Failed password for invalid user linda from 35.197.244.51 port 38268 ssh2
...
2020-07-11 15:02:19

Recently Reported IPs

45.130.203.128 2606:4700:10::6814:9002 2606:4700:10::6814:8991 2606:4700:10::6814:7297
2606:4700:10::6816:701 2606:4700:10::6814:8718 2606:4700:10::6816:1518 2606:4700:10::6816:2346
2606:4700:10::6816:4877 2606:4700:10::6814:9848 2606:4700:10::6814:9830 164.155.74.68
2606:4700:10::6814:5968 20.166.39.160 85.217.140.44 31.14.32.8
216.177.164.220 2606:4700:10::6816:4127 2606:4700:10::6816:2831 190.194.63.89