Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
136.243.145.139 attack
SSH Brute-Forcing (server2)
2020-01-16 17:03:01
136.243.145.68 attackbots
20 attempts against mh_ha-misbehave-ban on cold.magehost.pro
2019-08-10 16:40:23
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.243.145.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17446
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.243.145.54.			IN	A

;; AUTHORITY SECTION:
.			247	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 21:19:23 CST 2022
;; MSG SIZE  rcvd: 107
Host info
54.145.243.136.in-addr.arpa domain name pointer static.54.145.243.136.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.145.243.136.in-addr.arpa	name = static.54.145.243.136.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
175.6.70.180 attackbots
k+ssh-bruteforce
2020-03-13 05:37:53
222.186.52.139 attackspambots
DATE:2020-03-12 22:34:00, IP:222.186.52.139, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-03-13 05:41:34
45.151.254.218 attackspam
User Datagram Protocol, Src Port: tag-pm (5073), Dst Port: sip (5060)
From: "sipvicious";tag=6332613061383837313363340133353837303938303035
Accept: application/sdp
User-Agent: friendly-scanner
To: "sipvicious"
Contact: sip:100@45.151.254.218:5073
CSeq: 1 OPTIONS
Call-ID: 266344954241521547702694
https://www.virustotal.com/graph/embed/g88e60c19fe254cfa95de7adcfcb753a73b0346a99a364302b266225f9744f71c
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/splunk_upload_app_exec.rb
----------------
xxx.xxx.xxx.xxx 192.168.0.1	DNS 88	Standard query 0x9475 PTR xxx.xxx.xxx.xxx-addr.arpa & retrans Q
unicast multiprobe UDP 137 mmcc(5050) → mmcc(5050) Len=95 /96 / 99 ...
multicast  multiprobe 239.255.255.250	UDP 85	mmcc(5050) → mmcc(5050) Len=43
broadcast mutiprobe  xxx.xxx.xxx.255 UDP 85	mmcc(5050) → mmcc(5050) Len=43
2020-03-13 05:38:55
103.2.239.26 attackspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-03-13 05:55:17
134.175.124.221 attackspam
Mar 12 22:35:09 h2779839 sshd[4829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.124.221  user=root
Mar 12 22:35:11 h2779839 sshd[4829]: Failed password for root from 134.175.124.221 port 57460 ssh2
Mar 12 22:37:41 h2779839 sshd[4856]: Invalid user omega from 134.175.124.221 port 57782
Mar 12 22:37:41 h2779839 sshd[4856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.124.221
Mar 12 22:37:41 h2779839 sshd[4856]: Invalid user omega from 134.175.124.221 port 57782
Mar 12 22:37:42 h2779839 sshd[4856]: Failed password for invalid user omega from 134.175.124.221 port 57782 ssh2
Mar 12 22:40:16 h2779839 sshd[4932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.124.221  user=root
Mar 12 22:40:17 h2779839 sshd[4932]: Failed password for root from 134.175.124.221 port 58102 ssh2
Mar 12 22:42:41 h2779839 sshd[4969]: Invalid user openvpn_as from 13
...
2020-03-13 05:53:33
35.200.165.32 attackbotsspam
Mar 12 22:11:12 ewelt sshd[5661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.165.32  user=root
Mar 12 22:11:15 ewelt sshd[5661]: Failed password for root from 35.200.165.32 port 59154 ssh2
Mar 12 22:12:20 ewelt sshd[5713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.165.32  user=root
Mar 12 22:12:22 ewelt sshd[5713]: Failed password for root from 35.200.165.32 port 46850 ssh2
...
2020-03-13 05:32:52
91.218.65.137 attackbotsspam
Mar 12 17:42:49 ny01 sshd[1975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.218.65.137
Mar 12 17:42:51 ny01 sshd[1975]: Failed password for invalid user user1 from 91.218.65.137 port 47175 ssh2
Mar 12 17:46:46 ny01 sshd[3632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.218.65.137
2020-03-13 05:54:35
113.91.33.116 attackbots
SSH Authentication Attempts Exceeded
2020-03-13 05:36:32
185.39.10.73 attack
185.39.10.73 - - \[12/Mar/2020:22:12:40 +0100\] "GET /blog/wp-login.php HTTP/1.1" 404 564 "-" "Mozilla/5.0 \(compatible\; MSIE 9.0\; Windows NT 6.1\; Trident/5.0\)"
185.39.10.73 - - \[12/Mar/2020:22:12:40 +0100\] "GET /blogs/wp-login.php HTTP/1.1" 404 564 "-" "Mozilla/5.0 \(compatible\; MSIE 9.0\; Windows NT 6.1\; Trident/5.0\)"
185.39.10.73 - - \[12/Mar/2020:22:12:40 +0100\] "GET /home/wp-login.php HTTP/1.1" 404 564 "-" "Mozilla/5.0 \(compatible\; MSIE 9.0\; Windows NT 6.1\; Trident/5.0\)"
185.39.10.73 - - \[12/Mar/2020:22:12:40 +0100\] "GET /wordpress/wp-login.php HTTP/1.1" 404 564 "-" "Mozilla/5.0 \(compatible\; MSIE 9.0\; Windows NT 6.1\; Trident/5.0\)"
185.39.10.73 - - \[12/Mar/2020:22:12:40 +0100\] "GET /press/wp-login.php HTTP/1.1" 404 564 "-" "Mozilla/5.0 \(compatible\; MSIE 9.0\; Windows NT 6.1\; Trident/5.0\)"
...
2020-03-13 05:16:38
49.232.171.28 attackspam
$f2bV_matches
2020-03-13 05:34:18
222.186.3.249 attackbots
Mar 12 22:13:41 minden010 sshd[21206]: Failed password for root from 222.186.3.249 port 22755 ssh2
Mar 12 22:13:43 minden010 sshd[21206]: Failed password for root from 222.186.3.249 port 22755 ssh2
Mar 12 22:13:46 minden010 sshd[21206]: Failed password for root from 222.186.3.249 port 22755 ssh2
...
2020-03-13 05:18:53
199.223.232.221 attackbotsspam
Mar 12 21:57:14 vps sshd[19075]: Failed password for root from 199.223.232.221 port 42930 ssh2
Mar 12 22:08:01 vps sshd[19727]: Failed password for root from 199.223.232.221 port 58186 ssh2
...
2020-03-13 05:54:47
5.39.75.36 attackbotsspam
$f2bV_matches
2020-03-13 05:56:18
190.239.192.167 attack
20/3/12@17:12:14: FAIL: Alarm-Network address from=190.239.192.167
...
2020-03-13 05:37:24
115.231.156.236 attackspambots
Mar 12 22:10:51 localhost sshd\[29338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.156.236  user=root
Mar 12 22:10:54 localhost sshd\[29338\]: Failed password for root from 115.231.156.236 port 35058 ssh2
Mar 12 22:12:13 localhost sshd\[29513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.156.236  user=root
2020-03-13 05:38:18

Recently Reported IPs

136.243.149.34 136.243.15.148 136.243.148.37 136.243.151.155
136.243.147.28 136.243.150.227 136.243.144.97 136.243.150.150
136.243.149.59 136.243.146.200 104.22.18.117 136.243.151.50
136.243.152.125 136.243.152.231 136.243.153.43 136.243.154.156
136.243.153.151 136.243.154.115 136.243.154.235 136.243.152.19