IP Address: 45.131.64.143
This page shows DMARC authentication failure data for this IP address. Learn more about this data.
Geolocation Information
- Country:
- DE Germany
- Coordinates:
- 51.2993, 9.491
WHOIS Information
- Network Name:
- RIPE
- CIDR:
45.130.168.0/21, 45.131.0.0/16, 45.132.0.0/18, 45.130.176.0/20, 45.130.192.0/18, 45.132.64.0/20- Owner:
- RIPE Network Coordination Centre
- Org ID:
RIPE- Address:
- P.O. Box 10096, Amsterdam, 1001EB
- Reverse DNS:
-
143.64.131.45.in-addr.arpa
Last updated: 5/14/2026
Analysis
This IP generated 4 messages that triggered DMARC failures on May 12, 2026, all within a single day. Every message observed from this source failed both SPF and DKIM verification. Receiving mail providers applied a reject disposition, refusing delivery outright.
The reverse DNS record (143.64.131.45.in-addr.arpa) matches a generic ISP address pattern, typical of consumer or small-business connections rather than dedicated mail infrastructure. Mail originating from addresses like this is frequently associated with compromised endpoints, such as home routers, IoT devices, or infected personal computers being used as part of a botnet.
Geolocation places the host in Germany, on infrastructure operated by RIPE Network Coordination Centre. Abuse-reporting channels in this jurisdiction are generally responsive, and reports to the network operator can result in timely remediation.
The address is registered to RIPE Network Coordination Centre (RIPE), an enterprise network operator. Concentrated authentication failures on enterprise address space can indicate either a compromised internal host being used as an unauthorized sending relay, or an organization knowingly or unknowingly operating as a spam source.
Across the wider RIPE network, 53 distinct IPs have been associated with 91 authentication failures over 117 observed messages, spanning 20 countries. Most observed IPs on this network contribute to the failure count, suggesting the range as a whole warrants elevated scrutiny.
If your domain appears in the From header of mail from this address, treat it as probable spoofing. Verify that your SPF record does not authorize this host, directly or through nested include mechanisms, and that no DKIM selector you publish has been issued to it. If both checks come back clean, the receiver's reject action is doing its job.
Your DMARC policy posture matters more than any IP-level response here. The enforcement action applied to this mail indicates your policy is already providing protection. Maintaining p=reject across all your domains closes the gap for attackers who manage partial alignment. Domains that remain at p=none long-term tend to be impersonated repeatedly, because the cost to the attacker of attempting is effectively zero.
Blocking this individual address has limited durability: an attacker can rotate to another address in the same /24 subnet at effectively zero cost. More durable responses include monitoring aggregate DMARC reports so new sources are visible as they emerge, tightening SPF to remove overly permissive include chains or +all mechanisms, and ensuring DKIM is signing every legitimate outbound stream so alignment failures are unambiguous. The formal abuse contact for RIPE Network Coordination Centre is listed in RIPE WHOIS records, and timely remediation is achievable through that channel.
External Reputation Lookups
Look up this IP in external threat intelligence and reputation databases (opens in new tab):