Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Yinchuan

Region: Ningxia Hui Autonomous Region

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.45.8.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.45.8.145.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 09:35:25 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 145.8.45.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.8.45.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
95.90.145.20 attack
Sep  2 01:40:13 vps200512 sshd\[17692\]: Invalid user arm from 95.90.145.20
Sep  2 01:40:13 vps200512 sshd\[17692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.90.145.20
Sep  2 01:40:15 vps200512 sshd\[17692\]: Failed password for invalid user arm from 95.90.145.20 port 46564 ssh2
Sep  2 01:46:39 vps200512 sshd\[17834\]: Invalid user dayz from 95.90.145.20
Sep  2 01:46:39 vps200512 sshd\[17834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.90.145.20
2019-09-02 14:39:02
198.108.66.35 attackbots
81/tcp 11211/tcp 9200/tcp...
[2019-07-04/09-02]9pkt,6pt.(tcp)
2019-09-02 15:07:08
54.38.47.28 attack
Sep  2 07:05:06 site2 sshd\[11043\]: Invalid user fuck from 54.38.47.28Sep  2 07:05:08 site2 sshd\[11043\]: Failed password for invalid user fuck from 54.38.47.28 port 50506 ssh2Sep  2 07:08:53 site2 sshd\[11267\]: Invalid user jackie from 54.38.47.28Sep  2 07:08:55 site2 sshd\[11267\]: Failed password for invalid user jackie from 54.38.47.28 port 37322 ssh2Sep  2 07:12:34 site2 sshd\[12218\]: Invalid user tester from 54.38.47.28
...
2019-09-02 14:55:44
5.172.20.203 attack
[portscan] Port scan
2019-09-02 15:36:33
92.188.124.228 attackbotsspam
2019-09-02T08:38:49.202215lon01.zurich-datacenter.net sshd\[5465\]: Invalid user smolt from 92.188.124.228 port 42838
2019-09-02T08:38:49.213288lon01.zurich-datacenter.net sshd\[5465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.188.124.228
2019-09-02T08:38:51.183634lon01.zurich-datacenter.net sshd\[5465\]: Failed password for invalid user smolt from 92.188.124.228 port 42838 ssh2
2019-09-02T08:45:22.217556lon01.zurich-datacenter.net sshd\[5594\]: Invalid user admin from 92.188.124.228 port 35004
2019-09-02T08:45:22.227382lon01.zurich-datacenter.net sshd\[5594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.188.124.228
...
2019-09-02 14:49:29
182.138.151.15 attackspambots
Sep  2 01:58:18 vps34202 sshd[25661]: Invalid user user0 from 182.138.151.15
Sep  2 01:58:18 vps34202 sshd[25661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.138.151.15 
Sep  2 01:58:21 vps34202 sshd[25661]: Failed password for invalid user user0 from 182.138.151.15 port 56740 ssh2
Sep  2 01:58:21 vps34202 sshd[25661]: Received disconnect from 182.138.151.15: 11: Bye Bye [preauth]
Sep  2 02:17:14 vps34202 sshd[26184]: Invalid user contact from 182.138.151.15
Sep  2 02:17:14 vps34202 sshd[26184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.138.151.15 
Sep  2 02:17:16 vps34202 sshd[26184]: Failed password for invalid user contact from 182.138.151.15 port 57202 ssh2
Sep  2 02:17:17 vps34202 sshd[26184]: Received disconnect from 182.138.151.15: 11: Bye Bye [preauth]
Sep  2 02:20:43 vps34202 sshd[26454]: Invalid user vp from 182.138.151.15
Sep  2 02:20:43 vps34202 sshd[26454]: pa........
-------------------------------
2019-09-02 14:59:47
5.63.151.106 attackspambots
5353/udp 4000/tcp 10001/tcp...
[2019-07-14/09-02]8pkt,5pt.(tcp),3pt.(udp)
2019-09-02 15:38:13
177.66.208.121 attackbotsspam
8080/tcp 23/tcp...
[2019-07-10/09-02]4pkt,3pt.(tcp)
2019-09-02 14:35:16
128.199.96.234 attackbotsspam
Sep  2 05:11:42 game-panel sshd[6150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.96.234
Sep  2 05:11:44 game-panel sshd[6150]: Failed password for invalid user livechat from 128.199.96.234 port 35580 ssh2
Sep  2 05:16:42 game-panel sshd[6345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.96.234
2019-09-02 14:37:13
110.78.80.78 attack
Automatic report - Port Scan Attack
2019-09-02 15:14:08
221.4.223.212 attackspambots
Sep  2 07:43:51 mail sshd\[8054\]: Failed password for invalid user lines from 221.4.223.212 port 52332 ssh2
Sep  2 08:00:30 mail sshd\[8379\]: Invalid user mk from 221.4.223.212 port 49685
...
2019-09-02 15:09:01
165.22.106.224 attack
Sep  1 20:32:19 hiderm sshd\[12157\]: Invalid user viktor from 165.22.106.224
Sep  1 20:32:19 hiderm sshd\[12157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.106.224
Sep  1 20:32:21 hiderm sshd\[12157\]: Failed password for invalid user viktor from 165.22.106.224 port 37970 ssh2
Sep  1 20:38:13 hiderm sshd\[12635\]: Invalid user mx from 165.22.106.224
Sep  1 20:38:13 hiderm sshd\[12635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.106.224
2019-09-02 14:48:42
221.125.165.59 attackbotsspam
Sep  2 02:26:18 vps200512 sshd\[18639\]: Invalid user artur123 from 221.125.165.59
Sep  2 02:26:18 vps200512 sshd\[18639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.125.165.59
Sep  2 02:26:21 vps200512 sshd\[18639\]: Failed password for invalid user artur123 from 221.125.165.59 port 38430 ssh2
Sep  2 02:30:38 vps200512 sshd\[18710\]: Invalid user buerocomputer from 221.125.165.59
Sep  2 02:30:38 vps200512 sshd\[18710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.125.165.59
2019-09-02 14:46:51
223.243.29.102 attackspam
Sep  2 07:20:59 rotator sshd\[4207\]: Invalid user weixin from 223.243.29.102Sep  2 07:21:01 rotator sshd\[4207\]: Failed password for invalid user weixin from 223.243.29.102 port 35106 ssh2Sep  2 07:24:12 rotator sshd\[4235\]: Failed password for root from 223.243.29.102 port 33166 ssh2Sep  2 07:27:26 rotator sshd\[5060\]: Invalid user test from 223.243.29.102Sep  2 07:27:27 rotator sshd\[5060\]: Failed password for invalid user test from 223.243.29.102 port 59478 ssh2Sep  2 07:30:41 rotator sshd\[5828\]: Invalid user mysql from 223.243.29.102
...
2019-09-02 15:21:16
71.6.233.45 attackbots
" "
2019-09-02 15:24:48

Recently Reported IPs

106.45.8.157 106.45.8.199 106.45.8.22 106.45.8.28
106.45.8.169 106.45.8.253 106.45.8.83 106.45.8.187
106.45.8.68 106.45.8.40 106.45.8.63 72.157.175.247
106.45.8.92 106.45.9.127 106.45.9.123 106.45.8.90
106.45.9.19 106.45.9.135 106.45.9.184 106.45.9.234