Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.145.131.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61465
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.145.131.91.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021100 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 11 14:49:29 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 91.131.145.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 91.131.145.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
144.21.105.112 attack
Fail2Ban Ban Triggered
2019-08-22 04:41:56
180.179.174.247 attackspam
Aug 21 10:29:40 php2 sshd\[1175\]: Invalid user trial from 180.179.174.247
Aug 21 10:29:40 php2 sshd\[1175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=msmail.mouthshut.com
Aug 21 10:29:41 php2 sshd\[1175\]: Failed password for invalid user trial from 180.179.174.247 port 43586 ssh2
Aug 21 10:36:13 php2 sshd\[1803\]: Invalid user nico from 180.179.174.247
Aug 21 10:36:13 php2 sshd\[1803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=msmail.mouthshut.com
2019-08-22 04:40:44
40.78.3.140 attackspambots
[20/Aug/2019:17:07:03 -0400] "GET / HTTP/1.1" Chrome 51.0 UA
2019-08-22 04:17:30
185.227.154.60 attackbots
$f2bV_matches
2019-08-22 04:16:18
106.125.238.23 attackbots
Aug 21 13:05:01 mxgate1 postfix/postscreen[15932]: CONNECT from [106.125.238.23]:64365 to [176.31.12.44]:25
Aug 21 13:05:01 mxgate1 postfix/dnsblog[15936]: addr 106.125.238.23 listed by domain zen.spamhaus.org as 127.0.0.11
Aug 21 13:05:01 mxgate1 postfix/dnsblog[15936]: addr 106.125.238.23 listed by domain zen.spamhaus.org as 127.0.0.4
Aug 21 13:05:01 mxgate1 postfix/dnsblog[15937]: addr 106.125.238.23 listed by domain cbl.abuseat.org as 127.0.0.2
Aug 21 13:05:07 mxgate1 postfix/postscreen[15932]: DNSBL rank 3 for [106.125.238.23]:64365
Aug x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.125.238.23
2019-08-22 04:24:00
187.120.132.181 attackbots
Aug 21 13:34:01 xeon postfix/smtpd[5702]: warning: unknown[187.120.132.181]: SASL PLAIN authentication failed: authentication failure
2019-08-22 04:49:52
51.38.39.182 attackspam
Invalid user sigmund from 51.38.39.182 port 54270
2019-08-22 04:26:37
51.38.156.222 attackspambots
Aug 21 13:07:56 mxgate1 postfix/postscreen[15932]: CONNECT from [51.38.156.222]:35269 to [176.31.12.44]:25
Aug 21 13:07:56 mxgate1 postfix/dnsblog[15937]: addr 51.38.156.222 listed by domain zen.spamhaus.org as 127.0.0.3
Aug 21 13:07:56 mxgate1 postfix/dnsblog[15936]: addr 51.38.156.222 listed by domain b.barracudacentral.org as 127.0.0.2
Aug 21 13:08:02 mxgate1 postfix/postscreen[15932]: DNSBL rank 3 for [51.38.156.222]:35269
Aug x@x
Aug 21 13:08:02 mxgate1 postfix/postscreen[15932]: DISCONNECT [51.38.156.222]:35269


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=51.38.156.222
2019-08-22 04:32:35
58.199.164.240 attack
Aug 21 11:33:00 hb sshd\[15404\]: Invalid user www from 58.199.164.240
Aug 21 11:33:00 hb sshd\[15404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.199.164.240
Aug 21 11:33:02 hb sshd\[15404\]: Failed password for invalid user www from 58.199.164.240 port 56352 ssh2
Aug 21 11:36:15 hb sshd\[15670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.199.164.240  user=root
Aug 21 11:36:17 hb sshd\[15670\]: Failed password for root from 58.199.164.240 port 54108 ssh2
2019-08-22 04:39:40
112.85.42.229 attackbotsspam
08/21/2019-12:32:05.742458 112.85.42.229 Protocol: 6 ET SCAN Potential SSH Scan
2019-08-22 04:34:55
177.53.241.131 attackbots
Aug 21 21:50:04 lnxded64 sshd[13338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.53.241.131
2019-08-22 04:34:00
194.44.243.186 attack
2019-08-21 06:35:56 H=(ltius.it) [194.44.243.186]:40256 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-08-21 06:36:03 H=(ltius.it) [194.44.243.186]:40256 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/194.44.243.186)
2019-08-21 06:36:11 H=(ltius.it) [194.44.243.186]:40256 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
...
2019-08-22 04:43:16
118.24.219.111 attack
Aug 21 16:42:30 mout sshd[29632]: Invalid user prova from 118.24.219.111 port 44106
2019-08-22 04:22:48
35.185.239.108 attackspam
Aug 22 01:54:45 areeb-Workstation sshd\[15335\]: Invalid user qhsupport from 35.185.239.108
Aug 22 01:54:45 areeb-Workstation sshd\[15335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.185.239.108
Aug 22 01:54:48 areeb-Workstation sshd\[15335\]: Failed password for invalid user qhsupport from 35.185.239.108 port 46556 ssh2
...
2019-08-22 04:35:23
12.34.56.18 attackspam
vps1:sshd-InvalidUser
2019-08-22 04:48:57

Recently Reported IPs

45.145.131.76 45.145.131.89 45.145.131.68 45.148.122.110
45.145.131.82 45.148.126.122 45.148.235.227 45.148.234.218
45.15.16.114 45.154.244.174 45.152.208.148 45.153.22.50
45.152.202.82 45.154.56.90 45.155.173.163 45.151.253.106
45.159.21.176 45.159.21.132 45.155.205.224 45.158.184.177