Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Langen

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.135.164.0 - 45.138.163.255
CIDR:           45.135.176.0/20, 45.135.168.0/21, 45.135.164.0/22, 45.138.128.0/19, 45.136.0.0/15, 45.138.0.0/17, 45.135.192.0/18, 45.138.160.0/22
NetName:        RIPE
NetHandle:      NET-45-135-164-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Early Registrations, Transferred to RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2014-05-22
Updated:        2025-02-10
Comment:        These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref:            https://rdap.arin.net/registry/ip/45.135.164.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.135.193.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12413
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.135.193.131.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042802 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 29 17:00:55 CST 2026
;; MSG SIZE  rcvd: 107
Host info
b'131.193.135.45.in-addr.arpa domain name pointer 45.135.193.131.ptr.pfcloud.network.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
131.193.135.45.in-addr.arpa	name = 45.135.193.131.ptr.pfcloud.network.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.178 attack
Feb 28 20:12:09 vps647732 sshd[30166]: Failed password for root from 112.85.42.178 port 11529 ssh2
Feb 28 20:12:19 vps647732 sshd[30166]: Failed password for root from 112.85.42.178 port 11529 ssh2
...
2020-02-29 03:19:28
51.132.9.95 attackbotsspam
0,20-03/02 [bc28/m79] PostRequest-Spammer scoring: zurich
2020-02-29 03:47:11
205.134.182.116 attackspam
suspicious action Fri, 28 Feb 2020 10:27:10 -0300
2020-02-29 03:53:38
36.74.75.31 attack
(sshd) Failed SSH login from 36.74.75.31 (ID/Indonesia/-): 5 in the last 3600 secs
2020-02-29 03:35:16
217.92.21.82 attack
Feb 28 13:27:45 *** sshd[18229]: User root from 217.92.21.82 not allowed because not listed in AllowUsers
2020-02-29 03:26:51
191.193.105.166 attack
Automatic report - Port Scan Attack
2020-02-29 03:57:45
42.113.129.132 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 03:25:42
220.134.44.142 attackbots
Honeypot hit.
2020-02-29 03:57:15
5.157.96.66 attackbotsspam
(imapd) Failed IMAP login from 5.157.96.66 (IT/Italy/5-157-96-66.v4.ngi.it): 1 in the last 3600 secs
2020-02-29 03:38:45
118.163.251.142 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-02-29 03:32:30
79.164.176.68 attack
postfix (unknown user, SPF fail or relay access denied)
2020-02-29 03:23:18
167.71.111.16 attack
C1,WP GET /manga/wp-login.php
2020-02-29 03:51:05
42.112.202.150 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 03:36:07
177.139.150.179 attack
Automatic report - Port Scan Attack
2020-02-29 03:46:46
218.21.45.102 attack
Unauthorised access (Feb 28) SRC=218.21.45.102 LEN=52 TTL=45 ID=4784 DF TCP DPT=1433 WINDOW=8192 SYN
2020-02-29 03:43:20

Recently Reported IPs

2606:4700:10::6814:8349 131.103.141.18 69.3.235.157 49.7.235.5
43.160.219.138 110.77.248.117 2606:4700:10::ac43:2396 2606:4700:10::6814:7604
108.181.4.106 103.215.81.14 45.89.106.122 44.220.188.231
43.248.0.253 2606:4700:10::6814:7756 172.105.4.196 91.210.169.154
152.32.201.225 2606:4700:10::6816:3312 43.165.167.72 213.230.90.238