Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Moscow

Region: Moscow

Country: Russia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.45.194.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37616
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.45.194.13.			IN	A

;; AUTHORITY SECTION:
.			398	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090401 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 05 07:54:05 CST 2020
;; MSG SIZE  rcvd: 115
Host info
13.194.45.5.in-addr.arpa domain name pointer 5.45.194.13-red.dhcp.yndx.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.194.45.5.in-addr.arpa	name = 5.45.194.13-red.dhcp.yndx.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
47.52.164.26 attackbotsspam
Scanning and Vuln Attempts
2020-02-12 21:19:46
114.35.102.34 attack
firewall-block, port(s): 1433/tcp
2020-02-12 21:17:37
114.32.134.69 attackspambots
23/tcp
[2020-02-12]1pkt
2020-02-12 21:23:36
157.230.55.177 attackspam
Automatic report - XMLRPC Attack
2020-02-12 21:02:23
109.234.164.145 attackbots
109.234.164.145 has been banned for [WebApp Attack]
...
2020-02-12 20:59:08
103.68.18.118 attackbots
xmlrpc attack
2020-02-12 21:03:53
51.77.11.94 attackbots
SASL LOGIN authentication failed
2020-02-12 21:09:49
189.72.164.28 attack
Automatic report - Port Scan Attack
2020-02-12 21:32:49
168.196.222.181 attack
DATE:2020-02-12 05:48:24, IP:168.196.222.181, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-02-12 21:17:12
115.240.192.139 attackbotsspam
Unauthorized connection attempt from IP address 115.240.192.139 on Port 445(SMB)
2020-02-12 20:54:10
80.82.77.33 attackspam
scans 2 times in preceeding hours on the ports (in chronological order) 6667 52869 resulting in total of 351 scans from 80.82.64.0/20 block.
2020-02-12 21:27:14
193.32.161.71 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 10002 proto: TCP cat: Misc Attack
2020-02-12 20:58:36
179.53.232.223 attackbots
DATE:2020-02-12 05:46:51, IP:179.53.232.223, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-12 21:26:00
157.230.46.113 attack
SSH Login Failed
2020-02-12 21:34:32
118.71.251.2 attackspam
1581482915 - 02/12/2020 05:48:35 Host: 118.71.251.2/118.71.251.2 Port: 445 TCP Blocked
2020-02-12 21:08:01

Recently Reported IPs

126.156.9.95 150.60.232.123 124.17.122.165 143.177.9.105
175.168.55.30 172.42.101.180 217.58.95.161 182.64.150.91
88.200.151.252 32.108.170.160 236.125.4.139 187.188.251.218
78.84.91.85 28.76.230.108 60.132.78.234 164.103.146.203
112.187.163.213 106.30.98.81 91.181.61.107 169.199.87.198