Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Secaucus

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.130.168.0 - 45.132.79.255
CIDR:           45.130.192.0/18, 45.132.0.0/18, 45.132.64.0/20, 45.130.168.0/21, 45.130.176.0/20, 45.131.0.0/16
NetName:        RIPE
NetHandle:      NET-45-130-168-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Early Registrations, Transferred to RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2014-05-22
Updated:        2025-02-10
Comment:        These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref:            https://rdap.arin.net/registry/ip/45.130.168.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.131.195.181
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39785
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.131.195.181.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040200 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 00:01:49 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 181.195.131.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 181.195.131.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.158.122.211 attack
Jul 29 05:56:41 ip106 sshd[3125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.122.211 
Jul 29 05:56:43 ip106 sshd[3125]: Failed password for invalid user mukazhanov from 51.158.122.211 port 48720 ssh2
...
2020-07-29 12:19:21
106.13.102.154 attackspam
Jul 29 05:51:42 srv-ubuntu-dev3 sshd[102499]: Invalid user wangyan_stu from 106.13.102.154
Jul 29 05:51:42 srv-ubuntu-dev3 sshd[102499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.102.154
Jul 29 05:51:42 srv-ubuntu-dev3 sshd[102499]: Invalid user wangyan_stu from 106.13.102.154
Jul 29 05:51:45 srv-ubuntu-dev3 sshd[102499]: Failed password for invalid user wangyan_stu from 106.13.102.154 port 57364 ssh2
Jul 29 05:54:19 srv-ubuntu-dev3 sshd[102828]: Invalid user anthony from 106.13.102.154
Jul 29 05:54:19 srv-ubuntu-dev3 sshd[102828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.102.154
Jul 29 05:54:19 srv-ubuntu-dev3 sshd[102828]: Invalid user anthony from 106.13.102.154
Jul 29 05:54:21 srv-ubuntu-dev3 sshd[102828]: Failed password for invalid user anthony from 106.13.102.154 port 33416 ssh2
Jul 29 05:57:00 srv-ubuntu-dev3 sshd[103156]: Invalid user wushuaishuai from 106.13.102.154
...
2020-07-29 12:05:43
114.67.102.123 attackbots
Jul 29 05:57:14 vps647732 sshd[9334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.102.123
Jul 29 05:57:16 vps647732 sshd[9334]: Failed password for invalid user Aimee from 114.67.102.123 port 49138 ssh2
...
2020-07-29 12:03:43
139.59.79.152 attackspambots
ssh brute force
2020-07-29 12:18:06
2.95.73.124 attackspambots
Spam comment : объединение частных детективов 
 
В случае, если вы полагаете, что вы нуждаетесь в услугах частного следователя, следовательно, вероятно, встретились с серьезной деловой или личной проблемой, требующей помощи детектива. 
Наше частное детективное агентство трудится, с тем чтобы найти доказательства и данные, которые заказчику требуются, чтобы защитить свой бизнес, себя или свою семью. Детективное агенство готово предоставить вам экономичные, лучшие, комплексные, эффективные, результативные, системные и действенные услуги по расследованию.
Наша дело - оправдать ваши собственные ожидания и предоставить вам лично результативные решения проблем.  Частный детектив предлагает действенные методы, способствующие вам лично получить ответы на ваши собственные вопросы.Частный детектив может помочь раздобыть информацию, которая необходима в целях доказательства в судебном деле, розыска, пропавшего без вести либо выполнения других сл
2020-07-29 08:34:45
222.186.30.112 attack
Jul 29 06:03:10 * sshd[17151]: Failed password for root from 222.186.30.112 port 63118 ssh2
2020-07-29 12:11:58
49.232.106.176 attack
2020-07-28T23:31:28.7954561495-001 sshd[45079]: Invalid user cactiuser from 49.232.106.176 port 48818
2020-07-28T23:31:31.1446661495-001 sshd[45079]: Failed password for invalid user cactiuser from 49.232.106.176 port 48818 ssh2
2020-07-28T23:36:15.8457001495-001 sshd[45215]: Invalid user yy from 49.232.106.176 port 38192
2020-07-28T23:36:15.8532311495-001 sshd[45215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.106.176
2020-07-28T23:36:15.8457001495-001 sshd[45215]: Invalid user yy from 49.232.106.176 port 38192
2020-07-28T23:36:17.9297581495-001 sshd[45215]: Failed password for invalid user yy from 49.232.106.176 port 38192 ssh2
...
2020-07-29 12:08:11
51.83.41.120 attackspambots
Jul 28 23:52:51 ny01 sshd[18458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.41.120
Jul 28 23:52:52 ny01 sshd[18458]: Failed password for invalid user huluming from 51.83.41.120 port 48836 ssh2
Jul 28 23:56:52 ny01 sshd[19300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.41.120
2020-07-29 12:15:22
49.233.162.198 attackspam
Jul 29 06:29:42 [host] sshd[18448]: Invalid user o
Jul 29 06:29:42 [host] sshd[18448]: pam_unix(sshd:
Jul 29 06:29:44 [host] sshd[18448]: Failed passwor
2020-07-29 12:30:05
162.62.29.207 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-29 12:17:03
190.145.5.170 attackbotsspam
Jul 29 06:03:54 hell sshd[22118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.5.170
Jul 29 06:03:55 hell sshd[22118]: Failed password for invalid user tiantian from 190.145.5.170 port 34660 ssh2
...
2020-07-29 12:08:58
149.202.190.73 attackspam
Jul 29 06:28:23 vps639187 sshd\[8832\]: Invalid user wquan from 149.202.190.73 port 53228
Jul 29 06:28:23 vps639187 sshd\[8832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.190.73
Jul 29 06:28:25 vps639187 sshd\[8832\]: Failed password for invalid user wquan from 149.202.190.73 port 53228 ssh2
...
2020-07-29 12:28:41
141.98.9.157 attack
Jul 29 05:56:21 zooi sshd[21803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.157
Jul 29 05:56:23 zooi sshd[21803]: Failed password for invalid user admin from 141.98.9.157 port 36821 ssh2
...
2020-07-29 12:36:36
141.98.9.161 attackbots
Jul 29 05:56:31 zooi sshd[21817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161
Jul 29 05:56:34 zooi sshd[21817]: Failed password for invalid user admin from 141.98.9.161 port 42261 ssh2
...
2020-07-29 12:24:31
49.235.93.192 attack
Jul 28 21:56:35 Host-KLAX-C sshd[7083]: Disconnected from invalid user lyl 49.235.93.192 port 44016 [preauth]
...
2020-07-29 12:23:42

Recently Reported IPs

115.45.40.103 103.195.103.66 2606:4700:10::ac43:1291 2606:4700:10::6814:8725
2606:4700:10::6814:8039 66.132.172.208 45.131.195.180 212.135.40.37
2606:4700:10::6816:1984 110.77.226.205 2606:4700:10::ac43:2606 2606:4700:10::6816:625
110.78.153.74 2606:4700:10::6816:1228 2606:4700:10::6814:6499 122.6.219.29
31.146.3.10 111.172.6.251 70.39.180.121 222.175.106.142