Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.164.185.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51126
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.164.185.145.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022702 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 05:42:18 CST 2025
;; MSG SIZE  rcvd: 108
Host info
145.185.164.118.in-addr.arpa domain name pointer 118-164-185-145.dynamic-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.185.164.118.in-addr.arpa	name = 118-164-185-145.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.92.246 attack
May 21 05:58:54 nextcloud sshd\[32081\]: Invalid user cdn from 106.12.92.246
May 21 05:58:54 nextcloud sshd\[32081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.92.246
May 21 05:58:57 nextcloud sshd\[32081\]: Failed password for invalid user cdn from 106.12.92.246 port 60970 ssh2
2020-05-21 12:36:55
87.117.178.105 attackbots
May 21 00:56:03 firewall sshd[10524]: Invalid user tqv from 87.117.178.105
May 21 00:56:04 firewall sshd[10524]: Failed password for invalid user tqv from 87.117.178.105 port 44428 ssh2
May 21 00:59:26 firewall sshd[10640]: Invalid user mhi from 87.117.178.105
...
2020-05-21 12:19:19
121.204.166.240 attack
May 21 06:25:55 eventyay sshd[13133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.166.240
May 21 06:25:57 eventyay sshd[13133]: Failed password for invalid user xwg from 121.204.166.240 port 60343 ssh2
May 21 06:29:10 eventyay sshd[13240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.166.240
...
2020-05-21 12:36:10
137.74.132.171 attackspambots
May 21 02:17:33 vps687878 sshd\[32356\]: Failed password for invalid user ker from 137.74.132.171 port 57836 ssh2
May 21 02:20:52 vps687878 sshd\[32712\]: Invalid user shs from 137.74.132.171 port 36202
May 21 02:20:52 vps687878 sshd\[32712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.132.171
May 21 02:20:55 vps687878 sshd\[32712\]: Failed password for invalid user shs from 137.74.132.171 port 36202 ssh2
May 21 02:24:17 vps687878 sshd\[424\]: Invalid user wdi from 137.74.132.171 port 42796
May 21 02:24:17 vps687878 sshd\[424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.132.171
...
2020-05-21 08:33:40
117.6.235.71 attackspambots
SSH Brute-Force Attack
2020-05-21 12:18:21
62.28.217.62 attack
May 20 18:06:29 php1 sshd\[27458\]: Invalid user wmr from 62.28.217.62
May 20 18:06:29 php1 sshd\[27458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.217.62
May 20 18:06:31 php1 sshd\[27458\]: Failed password for invalid user wmr from 62.28.217.62 port 58702 ssh2
May 20 18:10:03 php1 sshd\[28210\]: Invalid user npr from 62.28.217.62
May 20 18:10:03 php1 sshd\[28210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.217.62
2020-05-21 12:12:38
37.187.100.50 attack
May 21 13:59:12 localhost sshd[635210]: Invalid user doongle from 37.187.100.50 port 50686
...
2020-05-21 12:28:08
118.71.75.141 attackspambots
" "
2020-05-21 12:07:44
106.12.176.188 attackbotsspam
Invalid user awr from 106.12.176.188 port 43634
2020-05-21 12:38:43
192.241.246.167 attackbotsspam
2020-05-21T03:56:15.802306abusebot-3.cloudsearch.cf sshd[16751]: Invalid user isj from 192.241.246.167 port 46551
2020-05-21T03:56:15.808134abusebot-3.cloudsearch.cf sshd[16751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.246.167
2020-05-21T03:56:15.802306abusebot-3.cloudsearch.cf sshd[16751]: Invalid user isj from 192.241.246.167 port 46551
2020-05-21T03:56:17.440799abusebot-3.cloudsearch.cf sshd[16751]: Failed password for invalid user isj from 192.241.246.167 port 46551 ssh2
2020-05-21T04:00:39.286349abusebot-3.cloudsearch.cf sshd[17059]: Invalid user iju from 192.241.246.167 port 22965
2020-05-21T04:00:39.294765abusebot-3.cloudsearch.cf sshd[17059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.246.167
2020-05-21T04:00:39.286349abusebot-3.cloudsearch.cf sshd[17059]: Invalid user iju from 192.241.246.167 port 22965
2020-05-21T04:00:41.502779abusebot-3.cloudsearch.cf sshd[17059]: Fa
...
2020-05-21 12:02:56
222.186.30.112 attackbots
May 21 08:59:40 gw1 sshd[30649]: Failed password for root from 222.186.30.112 port 32749 ssh2
...
2020-05-21 12:02:07
111.10.43.244 attack
May 21 05:51:04 vps sshd[560549]: Failed password for invalid user xpl from 111.10.43.244 port 54161 ssh2
May 21 05:55:06 vps sshd[577529]: Invalid user haoliyang from 111.10.43.244 port 48479
May 21 05:55:06 vps sshd[577529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.10.43.244
May 21 05:55:08 vps sshd[577529]: Failed password for invalid user haoliyang from 111.10.43.244 port 48479 ssh2
May 21 05:59:26 vps sshd[597006]: Invalid user jeg from 111.10.43.244 port 42795
...
2020-05-21 12:18:56
218.92.0.191 attack
05/21/2020-00:13:38.366733 218.92.0.191 Protocol: 6 ET SCAN Potential SSH Scan
2020-05-21 12:22:20
202.45.144.9 attackspambots
May 21 01:44:40 vayu sshd[322845]: Invalid user psa from 202.45.144.9
May 21 01:44:43 vayu sshd[322845]: Failed password for invalid user psa from 202.45.144.9 port 59781 ssh2
May 21 01:44:43 vayu sshd[322845]: Received disconnect from 202.45.144.9: 11: Bye Bye [preauth]
May 21 01:54:07 vayu sshd[326430]: Invalid user kua from 202.45.144.9


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=202.45.144.9
2020-05-21 08:33:15
51.178.27.237 attackspam
May 21 05:50:40 ns382633 sshd\[31610\]: Invalid user yzd from 51.178.27.237 port 39262
May 21 05:50:40 ns382633 sshd\[31610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.27.237
May 21 05:50:42 ns382633 sshd\[31610\]: Failed password for invalid user yzd from 51.178.27.237 port 39262 ssh2
May 21 05:59:39 ns382633 sshd\[436\]: Invalid user xwy from 51.178.27.237 port 57106
May 21 05:59:39 ns382633 sshd\[436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.27.237
2020-05-21 12:11:14

Recently Reported IPs

224.172.180.226 114.7.82.210 140.62.229.82 128.153.211.208
247.75.12.81 149.234.45.241 129.64.133.144 196.115.170.139
25.31.22.151 135.47.106.101 194.128.77.227 96.11.148.158
246.146.141.7 187.167.89.18 88.222.108.234 166.109.38.156
208.224.165.227 209.36.201.121 80.75.207.112 28.250.222.76