Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.154.50.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34417
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.154.50.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 10:59:21 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 145.50.154.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.50.154.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.29.226 attack
Website hacking attempt: Wordpress admin access [wp-login.php]
2019-10-07 05:32:37
114.67.70.94 attackbots
Oct  6 22:52:31 MK-Soft-VM7 sshd[31811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.70.94 
Oct  6 22:52:34 MK-Soft-VM7 sshd[31811]: Failed password for invalid user M0tdepasse321 from 114.67.70.94 port 56462 ssh2
...
2019-10-07 05:40:33
94.191.30.193 attackbotsspam
Oct  6 22:54:49 minden010 sshd[22309]: Failed password for root from 94.191.30.193 port 55602 ssh2
Oct  6 22:58:13 minden010 sshd[23555]: Failed password for root from 94.191.30.193 port 55722 ssh2
...
2019-10-07 05:11:25
106.13.74.93 attackspambots
Oct  6 23:30:15 OPSO sshd\[6134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.74.93  user=root
Oct  6 23:30:17 OPSO sshd\[6134\]: Failed password for root from 106.13.74.93 port 34392 ssh2
Oct  6 23:32:41 OPSO sshd\[6642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.74.93  user=root
Oct  6 23:32:43 OPSO sshd\[6642\]: Failed password for root from 106.13.74.93 port 56054 ssh2
Oct  6 23:35:09 OPSO sshd\[7227\]: Invalid user 123 from 106.13.74.93 port 49490
Oct  6 23:35:09 OPSO sshd\[7227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.74.93
2019-10-07 05:37:33
71.40.80.50 attack
Unauthorised access (Oct  6) SRC=71.40.80.50 LEN=52 TOS=0x10 PREC=0x40 TTL=115 ID=23448 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-07 05:08:56
46.101.77.58 attackspambots
Oct  6 22:14:08 localhost sshd\[9124\]: Invalid user MoulinRouge-123 from 46.101.77.58 port 59906
Oct  6 22:14:08 localhost sshd\[9124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.77.58
Oct  6 22:14:10 localhost sshd\[9124\]: Failed password for invalid user MoulinRouge-123 from 46.101.77.58 port 59906 ssh2
2019-10-07 05:41:07
170.51.25.151 attack
Chat Spam
2019-10-07 05:39:45
5.196.226.217 attackspambots
Oct  6 22:49:25 SilenceServices sshd[12989]: Failed password for root from 5.196.226.217 port 41622 ssh2
Oct  6 22:53:17 SilenceServices sshd[14047]: Failed password for root from 5.196.226.217 port 53588 ssh2
2019-10-07 05:18:04
173.220.206.162 attackspambots
SSH bruteforce
2019-10-07 05:27:46
104.236.22.133 attackbotsspam
Oct  6 23:29:05 vps01 sshd[3457]: Failed password for root from 104.236.22.133 port 43492 ssh2
2019-10-07 05:35:41
37.187.131.203 attackspam
Oct  6 18:33:02 vtv3 sshd\[8018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.131.203  user=root
Oct  6 18:33:04 vtv3 sshd\[8018\]: Failed password for root from 37.187.131.203 port 42348 ssh2
Oct  6 18:37:23 vtv3 sshd\[10335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.131.203  user=root
Oct  6 18:37:25 vtv3 sshd\[10335\]: Failed password for root from 37.187.131.203 port 37264 ssh2
Oct  6 18:41:14 vtv3 sshd\[12299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.131.203  user=root
Oct  6 18:52:50 vtv3 sshd\[17724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.131.203  user=root
Oct  6 18:52:52 vtv3 sshd\[17724\]: Failed password for root from 37.187.131.203 port 48884 ssh2
Oct  6 18:56:48 vtv3 sshd\[19712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rh
2019-10-07 05:08:00
222.186.52.124 attackbots
Oct  6 23:25:26 dcd-gentoo sshd[4377]: User root from 222.186.52.124 not allowed because none of user's groups are listed in AllowGroups
Oct  6 23:25:28 dcd-gentoo sshd[4377]: error: PAM: Authentication failure for illegal user root from 222.186.52.124
Oct  6 23:25:26 dcd-gentoo sshd[4377]: User root from 222.186.52.124 not allowed because none of user's groups are listed in AllowGroups
Oct  6 23:25:28 dcd-gentoo sshd[4377]: error: PAM: Authentication failure for illegal user root from 222.186.52.124
Oct  6 23:25:26 dcd-gentoo sshd[4377]: User root from 222.186.52.124 not allowed because none of user's groups are listed in AllowGroups
Oct  6 23:25:28 dcd-gentoo sshd[4377]: error: PAM: Authentication failure for illegal user root from 222.186.52.124
Oct  6 23:25:28 dcd-gentoo sshd[4377]: Failed keyboard-interactive/pam for invalid user root from 222.186.52.124 port 41922 ssh2
...
2019-10-07 05:43:58
165.22.60.65 attackspambots
www.eintrachtkultkellerfulda.de 165.22.60.65 \[06/Oct/2019:21:52:00 +0200\] "POST /wp-login.php HTTP/1.1" 200 2065 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.eintrachtkultkellerfulda.de 165.22.60.65 \[06/Oct/2019:21:52:01 +0200\] "POST /wp-login.php HTTP/1.1" 200 2070 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-07 05:12:51
163.172.144.228 attackbots
Oct  6 23:06:55 ns37 sshd[14408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.144.228
2019-10-07 05:26:20
211.159.169.118 attackbotsspam
Oct  6 11:24:24 web9 sshd\[11280\]: Invalid user Root!23Qwe from 211.159.169.118
Oct  6 11:24:24 web9 sshd\[11280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.169.118
Oct  6 11:24:26 web9 sshd\[11280\]: Failed password for invalid user Root!23Qwe from 211.159.169.118 port 55546 ssh2
Oct  6 11:27:39 web9 sshd\[11752\]: Invalid user Italy2017 from 211.159.169.118
Oct  6 11:27:39 web9 sshd\[11752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.169.118
2019-10-07 05:33:53

Recently Reported IPs

249.242.89.231 124.130.68.208 203.132.128.166 93.90.76.177
217.26.48.191 115.201.39.88 255.86.170.153 182.195.33.101
51.90.154.16 184.177.98.17 186.31.3.245 120.239.15.34
141.194.5.85 85.228.93.141 39.45.158.41 86.239.186.184
185.176.182.215 245.26.109.110 139.254.157.201 91.120.140.199