Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.239.192.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9793
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.239.192.138.		IN	A

;; AUTHORITY SECTION:
.			399	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:34:08 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 138.192.239.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.192.239.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
61.132.233.10 attackbots
Sep 14 10:21:17 OPSO sshd\[19270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.132.233.10  user=root
Sep 14 10:21:19 OPSO sshd\[19270\]: Failed password for root from 61.132.233.10 port 9992 ssh2
Sep 14 10:23:13 OPSO sshd\[19605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.132.233.10  user=root
Sep 14 10:23:16 OPSO sshd\[19605\]: Failed password for root from 61.132.233.10 port 20543 ssh2
Sep 14 10:25:17 OPSO sshd\[20032\]: Invalid user dave from 61.132.233.10 port 31125
Sep 14 10:25:17 OPSO sshd\[20032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.132.233.10
2020-09-14 20:33:22
220.191.210.132 attackbotsspam
 TCP (SYN) 220.191.210.132:6000 -> port 1433, len 40
2020-09-14 20:19:03
172.245.154.135 attackspambots
Port scan detected on ports: 8080[TCP], 8080[TCP], 8080[TCP]
2020-09-14 20:47:14
193.169.253.173 attack
Invalid user postgres from 193.169.253.173 port 43684
2020-09-14 20:26:42
106.12.84.29 attack
Multiple SSH authentication failures from 106.12.84.29
2020-09-14 20:16:56
58.230.147.230 attackspam
Sep 14 14:01:03 ourumov-web sshd\[19112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.230.147.230  user=root
Sep 14 14:01:06 ourumov-web sshd\[19112\]: Failed password for root from 58.230.147.230 port 57354 ssh2
Sep 14 14:02:32 ourumov-web sshd\[19206\]: Invalid user squid from 58.230.147.230 port 40078
...
2020-09-14 20:17:57
218.56.160.82 attackbots
Sep 14 11:05:14 Ubuntu-1404-trusty-64-minimal sshd\[32227\]: Invalid user test from 218.56.160.82
Sep 14 11:05:14 Ubuntu-1404-trusty-64-minimal sshd\[32227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.56.160.82
Sep 14 11:05:15 Ubuntu-1404-trusty-64-minimal sshd\[32227\]: Failed password for invalid user test from 218.56.160.82 port 17897 ssh2
Sep 14 11:18:10 Ubuntu-1404-trusty-64-minimal sshd\[14921\]: Invalid user e from 218.56.160.82
Sep 14 11:18:10 Ubuntu-1404-trusty-64-minimal sshd\[14921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.56.160.82
2020-09-14 20:44:58
45.141.84.99 attack
 TCP (SYN) 45.141.84.99:55000 -> port 10001, len 44
2020-09-14 20:15:08
222.186.175.217 attackspam
Sep 14 14:30:13 router sshd[26064]: Failed password for root from 222.186.175.217 port 34990 ssh2
Sep 14 14:30:17 router sshd[26064]: Failed password for root from 222.186.175.217 port 34990 ssh2
Sep 14 14:30:22 router sshd[26064]: Failed password for root from 222.186.175.217 port 34990 ssh2
Sep 14 14:30:25 router sshd[26064]: Failed password for root from 222.186.175.217 port 34990 ssh2
...
2020-09-14 20:32:50
114.67.77.148 attackbotsspam
Sep 14 14:20:00 root sshd[25968]: Failed password for root from 114.67.77.148 port 57546 ssh2
Sep 14 14:27:09 root sshd[26877]: Failed password for root from 114.67.77.148 port 38868 ssh2
...
2020-09-14 20:44:31
156.215.221.17 attack
1600016363 - 09/13/2020 18:59:23 Host: 156.215.221.17/156.215.221.17 Port: 445 TCP Blocked
2020-09-14 20:45:23
147.158.26.100 attack
Automatic report - Port Scan Attack
2020-09-14 20:53:29
61.177.172.61 attackbotsspam
Sep 14 12:22:16 rush sshd[32398]: Failed password for root from 61.177.172.61 port 16775 ssh2
Sep 14 12:22:29 rush sshd[32398]: error: maximum authentication attempts exceeded for root from 61.177.172.61 port 16775 ssh2 [preauth]
Sep 14 12:22:34 rush sshd[32405]: Failed password for root from 61.177.172.61 port 42852 ssh2
...
2020-09-14 20:31:45
178.33.175.49 attackbotsspam
Sep 14 12:05:52 localhost sshd[3618024]: Failed password for root from 178.33.175.49 port 60678 ssh2
Sep 14 12:08:28 localhost sshd[3623502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.175.49  user=root
Sep 14 12:08:30 localhost sshd[3623502]: Failed password for root from 178.33.175.49 port 60444 ssh2
Sep 14 12:11:09 localhost sshd[3629086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.175.49  user=root
Sep 14 12:11:11 localhost sshd[3629086]: Failed password for root from 178.33.175.49 port 60214 ssh2
...
2020-09-14 20:43:00
120.27.199.145 attackspambots
WordPress wp-login brute force :: 120.27.199.145 0.132 - [14/Sep/2020:09:18:57  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 2414 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-09-14 20:42:03

Recently Reported IPs

145.239.157.231 145.239.19.134 145.239.192.199 145.239.192.33
145.239.199.157 145.239.194.29 145.239.2.11 145.239.192.237
145.239.20.82 145.239.200.78 145.239.202.2 145.239.2.180
145.239.20.12 145.239.211.190 145.239.212.174 145.239.222.143
145.239.224.55 145.239.223.97 145.239.228.217 145.239.228.216