Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Secaucus

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 45.131.195.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46501
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;45.131.195.18.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 18:07:39 CST 2021
;; MSG SIZE  rcvd: 42

'
Host info
Host 18.195.131.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.195.131.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
82.221.100.91 attackbots
Ssh brute force
2020-09-07 17:13:18
45.142.120.20 attackspambots
2020-09-07 11:47:01 auth_plain authenticator failed for (User) [45.142.120.20]: 535 Incorrect authentication data (set_id=calgary@com.ua)
2020-09-07 11:47:41 auth_plain authenticator failed for (User) [45.142.120.20]: 535 Incorrect authentication data (set_id=ay@com.ua)
...
2020-09-07 16:52:22
195.54.160.21 attackspambots
Hacker
2020-09-07 17:29:58
103.91.209.222 attackspam
Unauthorised login to NAS
2020-09-07 17:12:03
138.68.247.248 attack
Invalid user renewed from 138.68.247.248 port 42904
2020-09-07 16:59:35
45.55.182.232 attack
Sep  7 13:54:37 gw1 sshd[9045]: Failed password for root from 45.55.182.232 port 47404 ssh2
...
2020-09-07 17:15:23
213.178.54.106 attackbots
DATE:2020-09-06 18:48:42, IP:213.178.54.106, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-09-07 17:26:29
58.213.116.170 attackspam
$f2bV_matches
2020-09-07 17:09:40
49.235.69.9 attackspambots
Sep  7 13:07:59 itv-usvr-01 sshd[10980]: Invalid user mikael from 49.235.69.9
2020-09-07 17:17:10
118.89.231.121 attackbots
Sep  7 07:00:41 sip sshd[22634]: Failed password for root from 118.89.231.121 port 51084 ssh2
Sep  7 07:05:39 sip sshd[23876]: Failed password for root from 118.89.231.121 port 40434 ssh2
2020-09-07 17:26:17
94.241.253.75 attackbotsspam
1599410920 - 09/06/2020 18:48:40 Host: 94.241.253.75/94.241.253.75 Port: 445 TCP Blocked
2020-09-07 17:26:53
161.35.126.137 attackspambots
(sshd) Failed SSH login from 161.35.126.137 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  7 11:07:52 amsweb01 sshd[23838]: Did not receive identification string from 161.35.126.137 port 46538
Sep  7 11:07:54 amsweb01 sshd[23839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.126.137  user=root
Sep  7 11:07:56 amsweb01 sshd[23839]: Failed password for root from 161.35.126.137 port 49608 ssh2
Sep  7 11:08:06 amsweb01 sshd[23929]: Invalid user oracle from 161.35.126.137 port 51444
Sep  7 11:08:08 amsweb01 sshd[23929]: Failed password for invalid user oracle from 161.35.126.137 port 51444 ssh2
2020-09-07 17:21:49
49.235.209.206 attackspam
2020-09-07T10:54:20.405886ks3355764 sshd[18605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.209.206  user=root
2020-09-07T10:54:22.462767ks3355764 sshd[18605]: Failed password for root from 49.235.209.206 port 47036 ssh2
...
2020-09-07 16:58:17
185.38.3.138 attackspambots
Sep  7 10:57:11 vps333114 sshd[3531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pan0138.panoulu.net  user=root
Sep  7 10:57:13 vps333114 sshd[3531]: Failed password for root from 185.38.3.138 port 59250 ssh2
...
2020-09-07 16:54:22
101.231.124.6 attackspambots
"fail2ban match"
2020-09-07 16:52:42

Recently Reported IPs

92.246.85.114 107.127.56.114 172.105.95.201 121.121.122.123
191.245.68.119 176.98.40.109 43.240.204.71 45.15.177.9
23.97.153.169 34.117.1.241 72.208.240.198 104.47.142.194
134.73.142.204 5.173.249.6 187.181.12.227 177.54.145.201
37.72.175.139 45.144.225.101 180.162.101.171 198.251.84.74