Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.137.217.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57507
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.137.217.145.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121101 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 03:59:09 CST 2024
;; MSG SIZE  rcvd: 106
Host info
145.217.137.5.in-addr.arpa domain name pointer ppp-5.137.217.145.nsk.rt.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.217.137.5.in-addr.arpa	name = ppp-5.137.217.145.nsk.rt.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
42.236.10.81 attack
Automated report (2020-07-09T13:49:42+08:00). Scraper detected at this address.
2020-07-09 18:09:26
106.13.30.99 attack
$f2bV_matches
2020-07-09 18:10:38
114.25.148.154 attackbots
1594266704 - 07/09/2020 05:51:44 Host: 114.25.148.154/114.25.148.154 Port: 445 TCP Blocked
2020-07-09 18:23:07
81.91.136.3 attackspambots
Jul  9 04:07:13 raspberrypi sshd[17737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.91.136.3 
Jul  9 04:07:15 raspberrypi sshd[17737]: Failed password for invalid user miaohaoran from 81.91.136.3 port 42986 ssh2
Jul  9 04:10:31 raspberrypi sshd[18158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.91.136.3 
...
2020-07-09 18:24:37
109.66.105.165 attackspam
Honeypot attack, port: 445, PTR: bzq-109-66-105-165.red.bezeqint.net.
2020-07-09 18:18:16
206.81.8.155 attackbots
Jul  9 10:12:03 plex-server sshd[963743]: Invalid user josephene from 206.81.8.155 port 42854
Jul  9 10:12:03 plex-server sshd[963743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.8.155 
Jul  9 10:12:03 plex-server sshd[963743]: Invalid user josephene from 206.81.8.155 port 42854
Jul  9 10:12:05 plex-server sshd[963743]: Failed password for invalid user josephene from 206.81.8.155 port 42854 ssh2
Jul  9 10:14:51 plex-server sshd[963992]: Invalid user tomcat from 206.81.8.155 port 41290
...
2020-07-09 18:21:50
43.250.187.22 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-09 18:21:32
81.214.142.254 attackspam
Unauthorized connection attempt from IP address 81.214.142.254 on Port 445(SMB)
2020-07-09 18:33:15
103.1.100.110 attack
Automatic report - Banned IP Access
2020-07-09 18:20:47
178.134.32.174 attackspam
Honeypot attack, port: 445, PTR: 178-134-32-174.dsl.utg.ge.
2020-07-09 18:29:33
5.67.162.211 attackspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-07-09 18:23:53
181.129.127.146 attackspam
Unauthorised access (Jul  9) SRC=181.129.127.146 LEN=48 TTL=109 ID=31364 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-09 18:37:36
49.65.1.134 attack
Jul  9 12:07:00 vps647732 sshd[21061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.1.134
Jul  9 12:07:03 vps647732 sshd[21061]: Failed password for invalid user robert from 49.65.1.134 port 2225 ssh2
...
2020-07-09 18:12:43
106.252.164.246 attackspam
Jul  9 10:27:28 game-panel sshd[10344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.252.164.246
Jul  9 10:27:30 game-panel sshd[10344]: Failed password for invalid user siara from 106.252.164.246 port 38564 ssh2
Jul  9 10:29:58 game-panel sshd[10419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.252.164.246
2020-07-09 18:38:05
83.130.10.72 attackbots
Email rejected due to spam filtering
2020-07-09 18:34:52

Recently Reported IPs

210.178.64.248 46.70.67.183 7.194.24.24 3.77.33.222
197.139.254.180 30.76.93.172 61.206.26.137 253.8.210.146
208.230.116.159 4.31.200.114 57.33.36.12 145.215.126.213
197.148.156.114 154.49.74.229 159.207.200.106 237.246.185.175
191.198.28.188 176.80.10.42 164.100.173.120 64.167.217.247