Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 45.130.231.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35520
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;45.130.231.69.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 18:15:33 CST 2021
;; MSG SIZE  rcvd: 42

'
Host info
69.231.130.45.in-addr.arpa domain name pointer srv99.niagahoster.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
69.231.130.45.in-addr.arpa	name = srv99.niagahoster.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
79.44.59.162 attackspambots
$f2bV_matches
2020-02-11 04:09:03
79.101.58.74 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-11 04:14:04
5.133.62.101 attackspambots
(imapd) Failed IMAP login from 5.133.62.101 (IT/Italy/-): 1 in the last 3600 secs
2020-02-11 04:40:39
103.253.42.35 attackbotsspam
SIP INVITE Method Request Flood Attempt, PTR: hk.vpn.sldc.pl.
2020-02-11 04:22:32
79.101.58.72 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-11 04:18:24
189.126.72.41 attack
...
2020-02-11 04:29:29
79.101.58.78 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-11 04:08:40
112.85.42.180 attack
Feb 10 21:40:02 MK-Soft-VM3 sshd[19887]: Failed password for root from 112.85.42.180 port 23355 ssh2
Feb 10 21:40:07 MK-Soft-VM3 sshd[19887]: Failed password for root from 112.85.42.180 port 23355 ssh2
...
2020-02-11 04:45:51
198.108.66.98 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-11 04:41:33
45.253.26.216 attackspam
Feb 10 19:53:58 v22018076622670303 sshd\[19243\]: Invalid user ojh from 45.253.26.216 port 53726
Feb 10 19:53:58 v22018076622670303 sshd\[19243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.253.26.216
Feb 10 19:54:00 v22018076622670303 sshd\[19243\]: Failed password for invalid user ojh from 45.253.26.216 port 53726 ssh2
...
2020-02-11 04:23:59
218.87.149.136 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-11 04:09:26
113.253.29.154 attack
Honeypot attack, port: 5555, PTR: 154-29-253-113-on-nets.com.
2020-02-11 04:43:21
124.156.64.50 attackspam
Honeypot attack, port: 2000, PTR: PTR record not found
2020-02-11 04:27:31
182.76.12.165 attack
Honeypot attack, port: 445, PTR: nsg-static-165.12.76.182-airtel.com.
2020-02-11 04:32:04
202.120.38.28 attackbotsspam
$f2bV_matches
2020-02-11 04:22:05

Recently Reported IPs

31.210.21.94 45.144.225.95 104.152.211.57 220.181.108.113
99.227.104.220 162.250.191.128 185.24.216.80 31.210.22.106
104.223.155.198 188.181.146.86 188.181.146.153 104.152.142.1
148.69.227.251 114.225.160.242 157.230.48.227 114.225.160.244
13.73.109.251 185.53.90.20 203.159.80.75 122.170.13.217