Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.239.108.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56337
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.239.108.5.			IN	A

;; AUTHORITY SECTION:
.			328	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 17:37:53 CST 2022
;; MSG SIZE  rcvd: 105
Host info
5.108.239.45.in-addr.arpa domain name pointer srv.mitin.io.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.108.239.45.in-addr.arpa	name = srv.mitin.io.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.82.64.127 attackspam
01/11/2020-17:15:58.154481 80.82.64.127 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-12 06:44:01
165.227.9.184 attackspambots
Jan 11 21:06:58 unicornsoft sshd\[29051\]: User daemon from 165.227.9.184 not allowed because not listed in AllowUsers
Jan 11 21:06:58 unicornsoft sshd\[29051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.9.184  user=daemon
Jan 11 21:07:00 unicornsoft sshd\[29051\]: Failed password for invalid user daemon from 165.227.9.184 port 10151 ssh2
2020-01-12 06:35:49
114.89.144.85 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-12 06:21:15
52.89.162.95 attackspambots
01/11/2020-22:54:32.354375 52.89.162.95 Protocol: 6 SURICATA TLS invalid record/traffic
2020-01-12 06:09:35
37.29.107.212 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-12 06:38:48
180.211.137.130 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-12 06:22:50
198.50.179.115 attackbots
Jan 11 23:09:04 SilenceServices sshd[7463]: Failed password for root from 198.50.179.115 port 52102 ssh2
Jan 11 23:11:52 SilenceServices sshd[8728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.179.115
Jan 11 23:11:54 SilenceServices sshd[8728]: Failed password for invalid user wv from 198.50.179.115 port 53452 ssh2
2020-01-12 06:24:20
149.71.103.59 attackspam
Honeypot attack, port: 445, PTR: 59.103.71.149.in-addr.arpa.dynamic.gestiondeservidor.com.
2020-01-12 06:09:11
66.176.155.65 attackspam
" "
2020-01-12 06:27:57
168.90.91.168 attack
Honeypot attack, port: 445, PTR: 168.91.90.168.static.megalinkpi.net.br.
2020-01-12 06:43:14
27.254.34.230 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-12 06:39:12
45.166.212.251 attackspambots
Unauthorized connection attempt detected from IP address 45.166.212.251 to port 139
2020-01-12 06:37:22
167.114.152.139 attackspambots
Automatic report - Banned IP Access
2020-01-12 06:39:57
218.214.19.183 attackspambots
Honeypot attack, port: 445, PTR: 183.19.214.218.sta.commander.net.au.
2020-01-12 06:13:54
171.255.224.110 attack
Honeypot attack, port: 445, PTR: dynamic-adsl.viettel.vn.
2020-01-12 06:09:55

Recently Reported IPs

45.239.209.112 45.239.107.4 45.241.194.212 45.239.93.138
45.242.1.188 45.239.45.214 45.240.215.45 45.242.145.76
45.243.108.28 45.243.255.126 45.243.94.40 45.244.86.135
45.247.244.48 45.247.251.65 45.247.24.242 45.247.109.66
45.247.236.142 45.247.31.118 45.243.31.232 45.248.148.109