Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.53.23.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63685
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.53.23.245.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 14:49:54 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 245.23.53.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 245.23.53.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.106.10.66 attackbots
Apr 17 17:40:08 pornomens sshd\[31514\]: Invalid user ba from 202.106.10.66 port 17609
Apr 17 17:40:08 pornomens sshd\[31514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.106.10.66
Apr 17 17:40:10 pornomens sshd\[31514\]: Failed password for invalid user ba from 202.106.10.66 port 17609 ssh2
...
2020-04-18 00:26:55
182.23.104.231 attack
Apr 17 19:36:14 ift sshd\[43332\]: Invalid user ki from 182.23.104.231Apr 17 19:36:17 ift sshd\[43332\]: Failed password for invalid user ki from 182.23.104.231 port 37596 ssh2Apr 17 19:40:27 ift sshd\[43844\]: Invalid user ftpuser from 182.23.104.231Apr 17 19:40:29 ift sshd\[43844\]: Failed password for invalid user ftpuser from 182.23.104.231 port 45370 ssh2Apr 17 19:44:32 ift sshd\[44224\]: Invalid user postgres from 182.23.104.231
...
2020-04-18 00:58:54
114.67.101.203 attackbots
Apr 10 04:59:50 r.ca sshd[26685]: Failed password for root from 114.67.101.203 port 42654 ssh2
2020-04-18 00:40:08
91.134.116.163 attackspambots
Apr 17 17:16:31 minden010 sshd[8232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.116.163
Apr 17 17:16:32 minden010 sshd[8232]: Failed password for invalid user rn from 91.134.116.163 port 52422 ssh2
Apr 17 17:20:11 minden010 sshd[9532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.116.163
...
2020-04-18 00:19:13
189.170.11.25 attack
Honeypot attack, port: 81, PTR: dsl-189-170-11-25-dyn.prod-infinitum.com.mx.
2020-04-18 00:56:52
190.56.108.140 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-18 00:21:08
124.127.132.22 attackspam
Port Scan: Events[1] countPorts[1]: 22 ..
2020-04-18 00:29:23
128.199.84.251 attackspam
$f2bV_matches
2020-04-18 00:22:02
51.75.123.107 attackspambots
Apr 17 18:24:08 server sshd[17575]: Failed password for invalid user gv from 51.75.123.107 port 53850 ssh2
Apr 17 18:28:19 server sshd[20815]: Failed password for invalid user ftpuser1 from 51.75.123.107 port 43432 ssh2
Apr 17 18:31:55 server sshd[23623]: Failed password for invalid user admin from 51.75.123.107 port 52444 ssh2
2020-04-18 00:53:15
36.67.248.206 attackbotsspam
Apr 17 18:32:02  sshd\[20942\]: Invalid user wi from 36.67.248.206Apr 17 18:32:04  sshd\[20942\]: Failed password for invalid user wi from 36.67.248.206 port 56680 ssh2
...
2020-04-18 00:47:40
211.147.77.8 attackspambots
Apr 17 17:58:38 minden010 sshd[27234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.147.77.8
Apr 17 17:58:40 minden010 sshd[27234]: Failed password for invalid user test from 211.147.77.8 port 59110 ssh2
Apr 17 18:03:01 minden010 sshd[29408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.147.77.8
...
2020-04-18 00:58:31
103.1.100.95 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-18 00:57:51
61.216.2.79 attackbotsspam
Apr 17 17:10:11 server sshd[38969]: Failed password for root from 61.216.2.79 port 35134 ssh2
Apr 17 17:26:34 server sshd[43625]: Failed password for invalid user at from 61.216.2.79 port 33290 ssh2
Apr 17 17:30:24 server sshd[44807]: Failed password for invalid user admin from 61.216.2.79 port 39530 ssh2
2020-04-18 00:35:56
213.153.152.175 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-18 00:27:57
117.248.21.15 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-18 00:39:09

Recently Reported IPs

39.228.46.226 156.145.145.6 6.209.154.221 251.101.40.2
15.221.227.98 186.28.3.128 185.229.125.220 28.106.215.84
231.61.13.225 216.71.214.239 173.170.105.235 40.51.141.240
151.37.193.242 147.52.21.25 214.90.245.116 220.148.145.8
132.187.245.118 165.160.210.0 228.79.89.99 168.144.229.211