Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.148.243.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24487
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.148.243.244.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 19:47:05 CST 2025
;; MSG SIZE  rcvd: 108
Host info
244.243.148.145.in-addr.arpa domain name pointer 145.148.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
244.243.148.145.in-addr.arpa	name = 145.148.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
54.173.68.205 attack
54.173.68.205 - - \[11/Aug/2020:17:10:42 +0300\] "POST /xmlrpc.php HTTP/1.1" 200 4682 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2020-08-12 00:12:33
123.114.208.126 attack
2020-08-11T14:09:35.434047+02:00  sshd[25885]: Failed password for root from 123.114.208.126 port 59513 ssh2
2020-08-12 00:13:47
190.145.12.233 attackspam
Aug 11 12:06:10 124388 sshd[17012]: Failed password for root from 190.145.12.233 port 47934 ssh2
Aug 11 12:07:51 124388 sshd[17081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.12.233  user=root
Aug 11 12:07:53 124388 sshd[17081]: Failed password for root from 190.145.12.233 port 46386 ssh2
Aug 11 12:09:43 124388 sshd[17336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.12.233  user=root
Aug 11 12:09:45 124388 sshd[17336]: Failed password for root from 190.145.12.233 port 44836 ssh2
2020-08-12 00:30:45
112.35.90.128 attackbots
Aug 11 08:09:49 logopedia-1vcpu-1gb-nyc1-01 sshd[295271]: Failed password for root from 112.35.90.128 port 50198 ssh2
...
2020-08-12 00:28:38
8.42.54.5 attackbots
Unauthorized IMAP connection attempt
2020-08-12 00:10:25
66.133.109.36 attackspam
Tried to connect (16x) -
2020-08-12 00:15:31
178.62.110.145 attackbotsspam
Automatic report - XMLRPC Attack
2020-08-12 00:00:41
220.176.99.31 attack
Port probing on unauthorized port 445
2020-08-12 00:09:31
222.186.173.238 attackspambots
Aug 11 18:30:57 theomazars sshd[1676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
Aug 11 18:30:59 theomazars sshd[1676]: Failed password for root from 222.186.173.238 port 30330 ssh2
2020-08-12 00:33:58
45.129.33.26 attackbots
 TCP (SYN) 45.129.33.26:51371 -> port 1100, len 44
2020-08-12 00:16:16
216.45.23.6 attack
Brute-force attempt banned
2020-08-12 00:24:06
88.247.30.201 attackbotsspam
20/8/11@08:09:40: FAIL: Alarm-Network address from=88.247.30.201
...
2020-08-12 00:36:08
139.155.13.81 attack
Aug 11 04:57:44 liveconfig01 sshd[9710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.13.81  user=r.r
Aug 11 04:57:46 liveconfig01 sshd[9710]: Failed password for r.r from 139.155.13.81 port 53748 ssh2
Aug 11 04:57:46 liveconfig01 sshd[9710]: Received disconnect from 139.155.13.81 port 53748:11: Bye Bye [preauth]
Aug 11 04:57:46 liveconfig01 sshd[9710]: Disconnected from 139.155.13.81 port 53748 [preauth]
Aug 11 05:12:49 liveconfig01 sshd[10416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.13.81  user=r.r
Aug 11 05:12:51 liveconfig01 sshd[10416]: Failed password for r.r from 139.155.13.81 port 58560 ssh2
Aug 11 05:12:51 liveconfig01 sshd[10416]: Received disconnect from 139.155.13.81 port 58560:11: Bye Bye [preauth]
Aug 11 05:12:51 liveconfig01 sshd[10416]: Disconnected from 139.155.13.81 port 58560 [preauth]
Aug 11 05:17:35 liveconfig01 sshd[10660]: pam_unix(sshd:auth........
-------------------------------
2020-08-12 00:38:10
192.241.222.191 attackspam
firewall-block, port(s): 9042/tcp
2020-08-12 00:00:26
111.229.93.104 attackspambots
Aug 11 09:35:09 ny01 sshd[5472]: Failed password for root from 111.229.93.104 port 35864 ssh2
Aug 11 09:37:05 ny01 sshd[5706]: Failed password for root from 111.229.93.104 port 54622 ssh2
2020-08-12 00:35:24

Recently Reported IPs

2.245.57.19 34.10.193.234 190.16.223.189 55.10.184.221
242.169.224.211 25.155.143.236 81.70.28.9 118.114.115.208
54.31.66.239 25.49.195.66 70.90.1.91 47.27.18.169
21.153.21.152 241.159.129.11 253.226.158.44 161.167.47.242
29.93.173.71 171.196.87.219 120.9.133.105 144.183.122.41