Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.100.147.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4643
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.100.147.145.		IN	A

;; AUTHORITY SECTION:
.			511	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 02:59:17 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 145.147.100.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.147.100.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
2.47.183.107 attack
Sep 23 21:22:16 pkdns2 sshd\[40038\]: Invalid user james from 2.47.183.107Sep 23 21:22:18 pkdns2 sshd\[40038\]: Failed password for invalid user james from 2.47.183.107 port 34606 ssh2Sep 23 21:26:27 pkdns2 sshd\[40209\]: Invalid user trixie from 2.47.183.107Sep 23 21:26:29 pkdns2 sshd\[40209\]: Failed password for invalid user trixie from 2.47.183.107 port 45286 ssh2Sep 23 21:30:31 pkdns2 sshd\[40385\]: Invalid user tomek from 2.47.183.107Sep 23 21:30:34 pkdns2 sshd\[40385\]: Failed password for invalid user tomek from 2.47.183.107 port 55956 ssh2
...
2020-09-24 06:12:20
61.177.172.168 attack
Sep 23 11:52:12 roki-contabo sshd\[30801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.168  user=root
Sep 23 11:52:13 roki-contabo sshd\[30801\]: Failed password for root from 61.177.172.168 port 59983 ssh2
Sep 23 11:52:34 roki-contabo sshd\[30810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.168  user=root
Sep 23 11:52:36 roki-contabo sshd\[30810\]: Failed password for root from 61.177.172.168 port 20633 ssh2
Sep 23 11:52:58 roki-contabo sshd\[30812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.168  user=root
Sep 23 11:52:12 roki-contabo sshd\[30801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.168  user=root
Sep 23 11:52:13 roki-contabo sshd\[30801\]: Failed password for root from 61.177.172.168 port 59983 ssh2
Sep 23 11:52:34 roki-contabo sshd\[30810\
...
2020-09-24 06:13:26
206.253.226.7 attack
23.09.2020 19:04:26 - Bad Robot 
Ignore Robots.txt
2020-09-24 05:40:21
34.102.176.152 attackbotsspam
fake sharepoint page for phishing
2020-09-24 06:12:07
94.102.49.3 attack
Port scan on 15 port(s): 28085 28205 28232 28321 28364 28387 28509 28554 28626 28629 28630 28802 28866 28892 28948
2020-09-24 06:03:36
151.30.236.188 attack
Sep 23 21:56:33 pve1 sshd[21303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.30.236.188 
Sep 23 21:56:34 pve1 sshd[21303]: Failed password for invalid user system from 151.30.236.188 port 33552 ssh2
...
2020-09-24 05:46:00
181.36.244.84 attackspam
Automatic report - Banned IP Access
2020-09-24 05:49:50
51.116.182.194 attackbotsspam
Multiple SSH authentication failures from 51.116.182.194
2020-09-24 05:40:48
46.245.222.203 attack
2020-09-22T16:31:01.238769hostname sshd[9075]: Failed password for invalid user owen from 46.245.222.203 port 46432 ssh2
...
2020-09-24 05:47:33
106.75.218.71 attackbotsspam
Sep 24 03:43:47 NG-HHDC-SVS-001 sshd[2680]: Invalid user plex from 106.75.218.71
...
2020-09-24 05:50:59
163.172.40.236 attackbotsspam
163.172.40.236 - - [24/Sep/2020:01:31:51 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-09-24 05:43:36
51.75.71.111 attackbotsspam
Sep 23 23:41:18 ns3164893 sshd[488]: Failed password for root from 51.75.71.111 port 60608 ssh2
Sep 23 23:45:58 ns3164893 sshd[755]: Invalid user park from 51.75.71.111 port 40383
...
2020-09-24 05:58:08
216.80.102.155 attackspambots
SSH Invalid Login
2020-09-24 06:12:46
177.22.126.149 attackbots
Sep 23 13:16:00 NPSTNNYC01T sshd[28691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.22.126.149
Sep 23 13:16:02 NPSTNNYC01T sshd[28691]: Failed password for invalid user manu from 177.22.126.149 port 33068 ssh2
Sep 23 13:19:58 NPSTNNYC01T sshd[29046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.22.126.149
...
2020-09-24 05:42:26
87.187.104.177 attackspam
Failed password for invalid user from 87.187.104.177 port 54530 ssh2
2020-09-24 05:58:47

Recently Reported IPs

115.207.27.52 114.100.20.212 114.100.20.197 114.100.20.215
114.100.20.218 114.100.20.207 114.100.20.220 114.100.20.232
114.100.20.234 114.100.20.24 114.100.20.240 114.100.20.226
115.207.27.54 114.100.20.243 114.100.20.28 114.100.20.246
114.100.20.250 114.100.20.7 114.100.20.81 114.100.20.83