Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.158.5.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48486
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;108.158.5.145.			IN	A

;; AUTHORITY SECTION:
.			130	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122600 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 26 22:29:04 CST 2021
;; MSG SIZE  rcvd: 106
Host info
Host 145.5.158.108.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 145.5.158.108.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
115.29.3.34 attack
Unauthorized connection attempt detected from IP address 115.29.3.34 to port 2220 [J]
2020-01-27 00:47:40
117.1.161.36 attackbots
Honeypot attack, port: 445, PTR: localhost.
2020-01-27 00:47:19
148.3.67.180 attackbots
Unauthorized connection attempt detected from IP address 148.3.67.180 to port 23 [J]
2020-01-27 00:43:43
170.106.36.137 attackbots
Unauthorized connection attempt detected from IP address 170.106.36.137 to port 6666 [J]
2020-01-27 00:42:54
59.112.252.136 attackspam
Unauthorized connection attempt detected from IP address 59.112.252.136 to port 4567 [J]
2020-01-27 00:28:45
23.129.64.209 attack
Unauthorized connection attempt detected from IP address 23.129.64.209 to port 2022 [J]
2020-01-27 00:31:20
77.76.52.142 attack
Jan 26 09:55:25 lanister sshd[3348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.76.52.142
Jan 26 09:55:25 lanister sshd[3348]: Invalid user somsak from 77.76.52.142
Jan 26 09:55:27 lanister sshd[3348]: Failed password for invalid user somsak from 77.76.52.142 port 54330 ssh2
Jan 26 10:07:09 lanister sshd[3445]: Invalid user tfc from 77.76.52.142
...
2020-01-27 00:26:40
91.207.184.80 attackspambots
Unauthorized connection attempt detected from IP address 91.207.184.80 to port 80 [J]
2020-01-27 00:22:34
189.213.153.233 attackspam
Unauthorized connection attempt detected from IP address 189.213.153.233 to port 23 [J]
2020-01-27 00:38:13
42.115.98.210 attackspambots
Unauthorized connection attempt detected from IP address 42.115.98.210 to port 80 [J]
2020-01-27 00:52:46
220.133.3.184 attack
Unauthorized connection attempt detected from IP address 220.133.3.184 to port 81 [J]
2020-01-27 00:12:58
45.7.232.253 attack
Unauthorized connection attempt detected from IP address 45.7.232.253 to port 80 [J]
2020-01-27 00:29:39
41.209.73.101 attackspam
Unauthorized connection attempt detected from IP address 41.209.73.101 to port 8080 [J]
2020-01-27 00:54:20
141.136.44.113 attackbotsspam
Unauthorized connection attempt detected from IP address 141.136.44.113 to port 8080 [J]
2020-01-27 00:16:36
185.156.177.169 attackspambots
Unauthorized connection attempt detected from IP address 185.156.177.169 to port 3002 [J]
2020-01-27 00:39:52

Recently Reported IPs

93.212.188.244 220.126.225.227 23.36.234.218 3.250.99.47
204.98.40.156 111.62.130.147 172.9.247.99 166.17.132.210
9.49.146.69 190.6.61.25 98.5.156.71 127.184.195.240
128.5.138.19 167.42.203.223 182.228.97.36 202.238.108.96
34.73.104.60 29.227.229.179 10.170.86.40 51.253.27.243