Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.165.117.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57289
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.165.117.145.		IN	A

;; AUTHORITY SECTION:
.			542	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021100 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 11 22:29:40 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 145.117.165.140.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 145.117.165.140.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
164.163.99.10 attackspambots
Invalid user nagios from 164.163.99.10 port 59102
2019-07-11 20:22:04
114.40.111.117 attackspam
37215/tcp
[2019-07-11]1pkt
2019-07-11 20:41:11
111.242.3.26 attack
37215/tcp
[2019-07-11]1pkt
2019-07-11 20:22:56
212.224.88.151 attackspambots
Invalid user sx from 212.224.88.151 port 44896
2019-07-11 20:36:32
67.235.54.66 attack
445/tcp
[2019-07-11]1pkt
2019-07-11 21:03:47
191.53.223.128 attack
Jul 10 23:41:27 web1 postfix/smtpd[18248]: warning: unknown[191.53.223.128]: SASL PLAIN authentication failed: authentication failure
...
2019-07-11 20:52:37
46.83.92.134 attackspambots
8080/tcp
[2019-07-11]1pkt
2019-07-11 20:35:34
124.94.144.211 attackspam
23/tcp
[2019-07-11]1pkt
2019-07-11 20:13:24
211.224.155.66 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-07-11 20:14:30
18.139.83.101 attack
Lines containing failures of 18.139.83.101
Jul 11 05:37:59 shared12 postfix/smtpd[3713]: connect from em3-18-139-83-101.ap-southeast-1.compute.amazonaws.com[18.139.83.101]
Jul x@x
Jul x@x
Jul 11 05:38:00 shared12 postfix/smtpd[3713]: disconnect from em3-18-139-83-101.ap-southeast-1.compute.amazonaws.com[18.139.83.101] ehlo=1 mail=2 rcpt=0/2 data=0/2 eclipset=1 quhostname=1 commands=5/9
Jul 11 05:38:06 shared12 postfix/smtpd[3713]: connect from em3-18-139-83-101.ap-southeast-1.compute.amazonaws.com[18.139.83.101]
Jul x@x
Jul x@x
Jul 11 05:38:07 shared12 postfix/smtpd[3713]: disconnect from em3-18-139-83-101.ap-southeast-1.compute.amazonaws.com[18.139.83.101] ehlo=1 mail=2 rcpt=0/2 data=0/2 eclipset=1 quhostname=1 commands=5/9
Jul 11 05:38:12 shared12 postfix/smtpd[3713]: connect from em3-18-139-83-101.ap-southeast-1.compute.amazonaws.com[18.139.83.101]
Jul x@x
Jul x@x
Jul 11 05:38:13 shared12 postfix/smtpd[3713]: disconnect from em3-18-139-83-101.ap-southeast-1.compute.am........
------------------------------
2019-07-11 21:06:37
193.188.22.38 attackbots
RDP Bruteforce
2019-07-11 21:05:55
219.248.137.8 attack
Invalid user ts3 from 219.248.137.8 port 41918
2019-07-11 20:46:58
223.16.140.14 attackbots
5555/tcp
[2019-07-11]1pkt
2019-07-11 21:04:35
222.212.143.133 attackspambots
445/tcp
[2019-07-11]1pkt
2019-07-11 20:13:03
122.53.103.130 attack
445/tcp
[2019-07-11]1pkt
2019-07-11 20:14:56

Recently Reported IPs

92.40.128.1 115.219.197.251 164.157.160.241 94.162.32.39
198.251.64.214 54.44.114.173 170.55.134.231 10.79.128.220
195.84.1.139 206.72.198.49 241.21.171.145 51.217.162.157
143.159.92.145 251.241.87.50 5.231.204.140 116.91.228.27
210.239.250.123 23.58.106.150 168.122.178.112 172.12.167.117