Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
145.239.149.100 attackspam
Attempted connection to ports 27495, 63771.
2020-03-31 00:02:58
145.239.144.188 attackspambots
GET /wp-content
2020-02-19 02:57:29
145.239.141.132 attackspambots
" "
2019-07-11 14:57:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.239.14.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46052
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.239.14.239.			IN	A

;; AUTHORITY SECTION:
.			392	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:34:05 CST 2022
;; MSG SIZE  rcvd: 107
Host info
239.14.239.145.in-addr.arpa domain name pointer www.univ-smb.fr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
239.14.239.145.in-addr.arpa	name = www.univ-smb.fr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
36.66.242.2 attackbots
Unauthorized connection attempt from IP address 36.66.242.2 on Port 445(SMB)
2019-12-24 19:58:43
203.135.4.146 attack
Unauthorized connection attempt from IP address 203.135.4.146 on Port 445(SMB)
2019-12-24 20:26:14
140.143.2.228 attackspam
Dec 24 12:40:26 51-15-180-239 sshd[21016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.2.228  user=root
Dec 24 12:40:28 51-15-180-239 sshd[21016]: Failed password for root from 140.143.2.228 port 44092 ssh2
...
2019-12-24 20:24:35
139.199.58.118 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-12-24 20:26:53
1.55.18.211 attack
Unauthorized connection attempt from IP address 1.55.18.211 on Port 445(SMB)
2019-12-24 19:56:10
118.70.42.155 attackspambots
Unauthorized connection attempt from IP address 118.70.42.155 on Port 445(SMB)
2019-12-24 19:59:59
86.98.152.53 attack
Unauthorized connection attempt from IP address 86.98.152.53 on Port 445(SMB)
2019-12-24 20:04:43
185.71.81.186 attackspambots
Unauthorized connection attempt from IP address 185.71.81.186 on Port 445(SMB)
2019-12-24 20:03:04
123.30.25.12 attackbotsspam
Unauthorized connection attempt from IP address 123.30.25.12 on Port 445(SMB)
2019-12-24 20:25:06
115.75.88.52 attack
Unauthorized connection attempt from IP address 115.75.88.52 on Port 445(SMB)
2019-12-24 20:10:39
110.164.189.53 attackspambots
Automatic report - Banned IP Access
2019-12-24 19:59:07
196.219.85.212 attack
Unauthorized connection attempt from IP address 196.219.85.212 on Port 445(SMB)
2019-12-24 20:00:52
117.4.35.77 attack
Unauthorized connection attempt detected from IP address 117.4.35.77 to port 445
2019-12-24 20:08:20
58.56.32.238 attackbots
Dec 24 08:46:11 tuxlinux sshd[57432]: Invalid user ami from 58.56.32.238 port 7902
Dec 24 08:46:11 tuxlinux sshd[57432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.32.238 
Dec 24 08:46:11 tuxlinux sshd[57432]: Invalid user ami from 58.56.32.238 port 7902
Dec 24 08:46:11 tuxlinux sshd[57432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.32.238 
...
2019-12-24 19:53:00
14.174.99.96 attackbotsspam
Unauthorized connection attempt from IP address 14.174.99.96 on Port 445(SMB)
2019-12-24 20:21:42

Recently Reported IPs

145.239.134.24 145.239.140.154 145.239.136.54 145.239.170.65
145.239.170.66 145.239.142.75 145.239.170.98 145.239.177.179
145.239.188.147 145.239.157.231 145.239.192.138 145.239.19.134
145.239.192.199 145.239.192.33 145.239.199.157 145.239.194.29
145.239.2.11 145.239.192.237 145.239.20.82 145.239.200.78