Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.131.92.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8883
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.131.92.145.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019073002 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 31 05:15:14 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 145.92.131.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 145.92.131.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
58.151.128.212 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-01-03 20:15:34
104.177.180.24 attack
Invalid user natnapang from 104.177.180.24 port 52144
2020-01-03 20:44:38
110.49.28.45 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-03 20:13:43
49.234.10.122 attack
Jan  3 12:28:11 MK-Soft-VM8 sshd[32217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.10.122 
Jan  3 12:28:14 MK-Soft-VM8 sshd[32217]: Failed password for invalid user stw from 49.234.10.122 port 53376 ssh2
...
2020-01-03 20:25:23
65.75.93.36 attackbots
Invalid user Vilhelm from 65.75.93.36 port 28294
2020-01-03 20:30:12
189.208.103.162 attack
Jan  2 23:22:33 mailman postfix/smtpd[2697]: warning: unknown[189.208.103.162]: SASL PLAIN authentication failed: authentication failure
2020-01-03 20:15:19
80.82.77.245 attack
ET DROP Dshield Block Listed Source group 1 - port: 1041 proto: UDP cat: Misc Attack
2020-01-03 20:40:55
67.251.235.52 attackbotsspam
DATE:2020-01-03 05:44:28, IP:67.251.235.52, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-01-03 20:04:50
84.2.138.137 attackspambots
Honeypot attack, port: 23, PTR: 54028A89.dsl.pool.telekom.hu.
2020-01-03 20:42:41
156.194.110.198 attackbots
Jan  3 05:43:30 vpn01 sshd[23918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.194.110.198
Jan  3 05:43:32 vpn01 sshd[23918]: Failed password for invalid user admin from 156.194.110.198 port 42042 ssh2
...
2020-01-03 20:44:22
2.185.241.67 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2020-01-03 20:39:16
185.88.159.85 attackbots
Honeypot attack, port: 445, PTR: static-85.159.88.185.countryonline.ru.
2020-01-03 20:12:24
188.166.31.205 attackbots
Invalid user backup from 188.166.31.205 port 53780
2020-01-03 20:29:13
104.248.146.1 attack
Jan  3 10:11:30 wordpress wordpress(blog.ruhnke.cloud)[20171]: Blocked authentication attempt for admin from ::ffff:104.248.146.1
2020-01-03 20:07:18
87.118.77.156 attackspambots
WP_xmlrpc_attack
2020-01-03 20:10:41

Recently Reported IPs

45.82.120.52 199.116.118.166 60.177.5.40 14.231.189.97
24.51.154.185 178.62.127.32 117.158.94.214 42.159.87.69
202.39.38.214 165.227.188.167 180.16.88.185 217.160.29.69
186.147.35.76 112.158.194.155 58.153.247.97 95.18.105.175
103.81.92.244 83.136.190.38 172.84.81.208 196.131.2.158