Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: Informatica Sydernet LTDA

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.225.245.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33517
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.225.245.130.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 22 22:12:46 +08 2019
;; MSG SIZE  rcvd: 118

Host info
Host 130.245.225.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 130.245.225.45.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
138.68.185.126 attackspambots
$f2bV_matches
2020-03-22 04:31:48
82.26.251.48 attackspam
Invalid user wding from 82.26.251.48 port 33642
2020-03-22 04:55:24
122.5.46.22 attack
Mar 21 20:56:31  sshd\[32293\]: Invalid user nq from 122.5.46.22Mar 21 20:56:34  sshd\[32293\]: Failed password for invalid user nq from 122.5.46.22 port 59686 ssh2
...
2020-03-22 04:36:11
95.85.30.24 attack
SSH login attempts @ 2020-03-08 17:30:48
2020-03-22 04:50:59
104.203.153.199 attackspam
-
2020-03-22 04:47:10
144.217.170.65 attack
Invalid user bot from 144.217.170.65 port 33612
2020-03-22 04:30:07
175.140.32.60 attack
Invalid user ftptest from 175.140.32.60 port 38398
2020-03-22 04:23:58
119.4.225.31 attackbotsspam
Mar 22 02:54:33 webhost01 sshd[556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.4.225.31
Mar 22 02:54:35 webhost01 sshd[556]: Failed password for invalid user sg from 119.4.225.31 port 50338 ssh2
...
2020-03-22 04:37:31
165.227.200.161 attack
Invalid user download from 165.227.200.161 port 43704
2020-03-22 04:26:11
154.66.197.36 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-03-22 04:29:36
62.234.206.12 attackbots
Mar 21 23:50:21 areeb-Workstation sshd[20856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.206.12 
Mar 21 23:50:23 areeb-Workstation sshd[20856]: Failed password for invalid user candida from 62.234.206.12 port 43980 ssh2
...
2020-03-22 04:58:19
103.28.219.211 attackbotsspam
Mar 21 21:40:40 eventyay sshd[8068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.219.211
Mar 21 21:40:42 eventyay sshd[8068]: Failed password for invalid user php from 103.28.219.211 port 36704 ssh2
Mar 21 21:45:00 eventyay sshd[8260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.219.211
...
2020-03-22 04:49:41
137.74.43.2 attackspambots
2020-03-21T12:23:43.023753-07:00 suse-nuc sshd[17586]: Invalid user lvzhizhou from 137.74.43.2 port 58274
...
2020-03-22 04:32:39
122.51.158.15 attack
Brute-force attempt banned
2020-03-22 04:35:57
106.13.5.140 attack
Invalid user no from 106.13.5.140 port 14763
2020-03-22 04:44:07

Recently Reported IPs

174.48.171.83 117.209.168.210 68.210.136.236 198.108.66.219
42.42.72.101 78.132.92.86 46.176.149.152 36.25.140.134
51.79.130.252 58.202.207.4 51.158.251.217 182.210.27.145
143.0.33.79 189.223.61.117 123.75.198.12 198.108.66.228
202.173.87.98 181.239.114.222 142.11.230.73 181.13.76.174