Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.191.130.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9156
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.191.130.145.			IN	A

;; AUTHORITY SECTION:
.			273	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 08 00:24:48 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 145.130.191.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.130.191.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.91.176.157 attackbotsspam
Unauthorized connection attempt from IP address 80.91.176.157 on Port 445(SMB)
2020-06-17 04:16:54
36.91.38.31 attackspam
Jun 16 22:01:46 home sshd[6568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.38.31
Jun 16 22:01:48 home sshd[6568]: Failed password for invalid user master from 36.91.38.31 port 56710 ssh2
Jun 16 22:06:03 home sshd[7051]: Failed password for root from 36.91.38.31 port 57422 ssh2
...
2020-06-17 04:18:49
116.196.73.159 attackspam
Apr  2 23:56:29 ms-srv sshd[19114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.73.159  user=root
Apr  2 23:56:30 ms-srv sshd[19114]: Failed password for invalid user root from 116.196.73.159 port 43720 ssh2
2020-06-17 04:08:57
186.10.209.44 attack
trying to access non-authorized port
2020-06-17 04:11:40
140.249.18.118 attackbotsspam
Jun 17 02:09:11 dhoomketu sshd[802758]: Failed password for invalid user user1 from 140.249.18.118 port 45660 ssh2
Jun 17 02:11:59 dhoomketu sshd[802880]: Invalid user apple from 140.249.18.118 port 35686
Jun 17 02:11:59 dhoomketu sshd[802880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.18.118 
Jun 17 02:11:59 dhoomketu sshd[802880]: Invalid user apple from 140.249.18.118 port 35686
Jun 17 02:12:01 dhoomketu sshd[802880]: Failed password for invalid user apple from 140.249.18.118 port 35686 ssh2
...
2020-06-17 04:45:26
89.189.128.13 attackbotsspam
Unauthorized connection attempt from IP address 89.189.128.13 on Port 445(SMB)
2020-06-17 04:34:33
87.156.129.99 attackbots
Jun 16 18:19:06 pbkit sshd[51531]: Failed password for invalid user appldisc from 87.156.129.99 port 53816 ssh2
Jun 16 18:29:04 pbkit sshd[51771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.156.129.99  user=root
Jun 16 18:29:06 pbkit sshd[51771]: Failed password for root from 87.156.129.99 port 39606 ssh2
...
2020-06-17 04:34:22
193.95.24.114 attack
Brute-force attempt banned
2020-06-17 04:24:21
171.237.248.234 attack
Unauthorized connection attempt from IP address 171.237.248.234 on Port 445(SMB)
2020-06-17 04:22:50
58.23.16.254 attackbots
Jun 17 01:34:14 dhoomketu sshd[801678]: Invalid user speedtest from 58.23.16.254 port 44434
Jun 17 01:34:14 dhoomketu sshd[801678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.23.16.254 
Jun 17 01:34:14 dhoomketu sshd[801678]: Invalid user speedtest from 58.23.16.254 port 44434
Jun 17 01:34:15 dhoomketu sshd[801678]: Failed password for invalid user speedtest from 58.23.16.254 port 44434 ssh2
Jun 17 01:35:33 dhoomketu sshd[801693]: Invalid user user1 from 58.23.16.254 port 63370
...
2020-06-17 04:13:36
193.112.50.203 attack
Jun 16 23:24:27 journals sshd\[71148\]: Invalid user webserver from 193.112.50.203
Jun 16 23:24:27 journals sshd\[71148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.50.203
Jun 16 23:24:29 journals sshd\[71148\]: Failed password for invalid user webserver from 193.112.50.203 port 35046 ssh2
Jun 16 23:28:43 journals sshd\[71603\]: Invalid user dmy from 193.112.50.203
Jun 16 23:28:43 journals sshd\[71603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.50.203
...
2020-06-17 04:41:58
117.192.10.202 attackbots
Unauthorized connection attempt from IP address 117.192.10.202 on Port 445(SMB)
2020-06-17 04:35:23
209.150.146.126 attack
Unauthorized connection attempt from IP address 209.150.146.126 on Port 445(SMB)
2020-06-17 04:19:01
198.245.51.185 attackspam
IP blocked
2020-06-17 04:08:28
85.106.55.172 attackbots
Unauthorized connection attempt from IP address 85.106.55.172 on Port 445(SMB)
2020-06-17 04:24:09

Recently Reported IPs

45.225.105.108 131.72.68.161 191.97.9.86 5.202.103.100
18.163.111.238 185.117.122.165 37.210.41.26 5.11.228.61
41.65.160.171 185.101.169.233 164.163.189.28 5.202.191.225
167.60.4.57 94.231.216.13 185.101.169.38 5.196.53.194
46.199.87.82 66.231.70.4 188.121.106.171 1.52.27.109