Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.105.23.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56327
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.105.23.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121202 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 13 02:18:53 CST 2024
;; MSG SIZE  rcvd: 107
Host info
b'Host 145.23.105.144.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 144.105.23.145.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
162.243.132.46 attack
Unauthorized connection attempt detected from IP address 162.243.132.46 to port 587
2020-03-14 02:16:20
118.70.170.120 attack
Unauthorized connection attempt from IP address 118.70.170.120 on Port 445(SMB)
2020-03-14 02:21:15
188.165.233.82 attackbotsspam
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-03-14 02:19:32
106.12.88.232 attackspambots
2020-03-13T12:41:20.174549abusebot-7.cloudsearch.cf sshd[6691]: Invalid user sphinx from 106.12.88.232 port 50860
2020-03-13T12:41:20.178692abusebot-7.cloudsearch.cf sshd[6691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.88.232
2020-03-13T12:41:20.174549abusebot-7.cloudsearch.cf sshd[6691]: Invalid user sphinx from 106.12.88.232 port 50860
2020-03-13T12:41:22.051059abusebot-7.cloudsearch.cf sshd[6691]: Failed password for invalid user sphinx from 106.12.88.232 port 50860 ssh2
2020-03-13T12:45:53.458306abusebot-7.cloudsearch.cf sshd[7048]: Invalid user chenyifan from 106.12.88.232 port 49530
2020-03-13T12:45:53.465100abusebot-7.cloudsearch.cf sshd[7048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.88.232
2020-03-13T12:45:53.458306abusebot-7.cloudsearch.cf sshd[7048]: Invalid user chenyifan from 106.12.88.232 port 49530
2020-03-13T12:45:55.147041abusebot-7.cloudsearch.cf sshd[7048]: Fai
...
2020-03-14 01:47:38
178.86.159.210 attack
Unauthorized connection attempt from IP address 178.86.159.210 on Port 445(SMB)
2020-03-14 02:17:37
222.186.180.8 attackbotsspam
Mar 13 19:08:59 minden010 sshd[26845]: Failed password for root from 222.186.180.8 port 11924 ssh2
Mar 13 19:09:03 minden010 sshd[26845]: Failed password for root from 222.186.180.8 port 11924 ssh2
Mar 13 19:09:06 minden010 sshd[26845]: Failed password for root from 222.186.180.8 port 11924 ssh2
Mar 13 19:09:10 minden010 sshd[26845]: Failed password for root from 222.186.180.8 port 11924 ssh2
...
2020-03-14 02:22:33
195.20.28.192 attackbots
Unauthorized connection attempt from IP address 195.20.28.192 on Port 445(SMB)
2020-03-14 01:55:40
95.152.53.243 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/95.152.53.243/ 
 
 RU - 1H : (104)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN12389 
 
 IP : 95.152.53.243 
 
 CIDR : 95.152.0.0/18 
 
 PREFIX COUNT : 2741 
 
 UNIQUE IP COUNT : 8699648 
 
 
 ATTACKS DETECTED ASN12389 :  
  1H - 4 
  3H - 8 
  6H - 8 
 12H - 8 
 24H - 8 
 
 DateTime : 2020-03-13 13:45:52 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-14 01:47:54
182.74.68.34 attack
Unauthorized connection attempt from IP address 182.74.68.34 on Port 445(SMB)
2020-03-14 01:50:32
145.14.133.252 attackspambots
Jan 23 06:17:27 pi sshd[29649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.14.133.252 
Jan 23 06:17:28 pi sshd[29649]: Failed password for invalid user usertest from 145.14.133.252 port 49616 ssh2
2020-03-14 01:39:37
213.60.165.77 attackbots
Invalid user b from 213.60.165.77 port 32926
2020-03-14 01:46:33
144.131.134.105 attackspam
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.131.134.105 
Failed password for invalid user wp from 144.131.134.105 port 51921 ssh2
Failed password for root from 144.131.134.105 port 47679 ssh2
2020-03-14 02:10:03
190.207.87.64 attackbotsspam
Unauthorized connection attempt from IP address 190.207.87.64 on Port 445(SMB)
2020-03-14 02:06:25
191.113.63.155 attackbots
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-03-14 02:13:45
142.93.26.245 attackbotsspam
Jan  8 12:37:58 pi sshd[7064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245 
Jan  8 12:37:59 pi sshd[7064]: Failed password for invalid user ralph from 142.93.26.245 port 34040 ssh2
2020-03-14 02:20:53

Recently Reported IPs

180.132.52.239 31.155.87.57 104.223.74.22 30.7.143.65
162.19.43.248 243.5.66.41 220.11.62.180 199.158.192.123
114.126.32.111 200.39.187.116 177.105.98.25 75.11.213.112
114.147.238.175 237.121.123.0 79.43.226.212 26.19.246.155
148.9.100.98 159.251.153.245 29.15.47.61 10.139.83.16