Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Fukuoka

Region: Fukuoka

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.145.144.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;122.145.144.144.		IN	A

;; AUTHORITY SECTION:
.			525	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030200 1800 900 604800 86400

;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 02 15:18:14 CST 2020
;; MSG SIZE  rcvd: 119
Host info
144.144.145.122.in-addr.arpa domain name pointer 144.144.145.122.ap.yournet.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
144.144.145.122.in-addr.arpa	name = 144.144.145.122.ap.yournet.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
165.22.216.204 attackspambots
Invalid user work from 165.22.216.204 port 46684
2020-03-20 04:53:11
195.231.0.109 attackspambots
Invalid user admin from 195.231.0.109 port 50356
2020-03-20 04:21:56
79.188.68.89 attackbotsspam
Invalid user packer from 79.188.68.89 port 43048
2020-03-20 04:39:03
139.159.3.18 attack
Invalid user jose from 139.159.3.18 port 22359
2020-03-20 04:27:32
218.4.164.86 attack
(sshd) Failed SSH login from 218.4.164.86 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 19 17:44:11 s1 sshd[1972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.164.86  user=root
Mar 19 17:44:13 s1 sshd[1972]: Failed password for root from 218.4.164.86 port 19295 ssh2
Mar 19 17:50:11 s1 sshd[2098]: Invalid user albert from 218.4.164.86 port 57505
Mar 19 17:50:12 s1 sshd[2098]: Failed password for invalid user albert from 218.4.164.86 port 57505 ssh2
Mar 19 17:54:15 s1 sshd[2166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.164.86  user=root
2020-03-20 04:18:11
114.141.191.238 attack
Mar 19 17:27:45 163-172-32-151 sshd[5624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.141.191.238  user=root
Mar 19 17:27:47 163-172-32-151 sshd[5624]: Failed password for root from 114.141.191.238 port 54313 ssh2
...
2020-03-20 04:32:14
201.187.110.137 attackspambots
Invalid user postgres from 201.187.110.137 port 61950
2020-03-20 04:20:44
60.29.123.202 attackbots
DATE:2020-03-19 21:25:36, IP:60.29.123.202, PORT:ssh SSH brute force auth (docker-dc)
2020-03-20 04:39:40
185.164.72.133 attackspam
Invalid user fake from 185.164.72.133 port 57124
2020-03-20 04:49:22
106.12.95.45 attack
Mar 19 20:19:43 localhost sshd[119305]: Invalid user git from 106.12.95.45 port 56388
Mar 19 20:19:43 localhost sshd[119305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.95.45
Mar 19 20:19:43 localhost sshd[119305]: Invalid user git from 106.12.95.45 port 56388
Mar 19 20:19:45 localhost sshd[119305]: Failed password for invalid user git from 106.12.95.45 port 56388 ssh2
Mar 19 20:25:53 localhost sshd[119914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.95.45  user=root
Mar 19 20:25:55 localhost sshd[119914]: Failed password for root from 106.12.95.45 port 50354 ssh2
...
2020-03-20 04:36:00
82.223.35.240 attack
Invalid user lee from 82.223.35.240 port 48726
2020-03-20 04:38:21
197.50.17.205 attackspam
Invalid user pi from 197.50.17.205 port 57568
2020-03-20 04:21:36
1.85.222.252 attackspambots
Invalid user ubuntu from 1.85.222.252 port 51210
2020-03-20 04:45:11
34.93.211.49 attackbots
Mar 19 20:59:32 xeon sshd[59246]: Failed password for invalid user cpanellogin from 34.93.211.49 port 44168 ssh2
2020-03-20 04:44:23
106.54.48.29 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-03-20 04:34:59

Recently Reported IPs

1.30.172.204 98.76.146.146 164.172.62.83 132.30.74.255
18.223.22.60 219.143.174.222 133.205.0.130 218.72.209.210
202.98.249.199 212.1.95.158 39.68.96.244 199.116.118.253
36.212.169.59 27.193.191.125 178.82.113.215 211.97.21.112
185.74.171.106 164.68.127.98 197.237.23.70 191.38.46.112