Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
145.239.29.12 spam
Exploit.RTF-ObfsStrm.Gen
2025-01-23 20:00:43
145.239.23.196 spamattack
PHISHING AND SPAM ATTACK
FROM "Wealth Loophole - eqyeyrp@storages.moscow - " : 
SUBJECT "Citizens are already raking in millions of dollars from home using this "wealth loophole" " :
RECEIVED "from storages.moscow (media1.worldbtcnews.com [145.239.23.196] " :
DATE/TIMESENT "Wed, 17 Mar 2021 01:53:17 ":
IP ADDRESS "inetnum: 145.239.23.192 - 145.239.23.207  OrgName: Information Technologies AltinSoft" :
2021-03-17 15:31:29
145.239.29.217 attackspam
wp-login.php
2020-10-06 02:01:23
145.239.29.217 attack
Attempt to hack Wordpress Login, XMLRPC or other login
2020-10-05 17:49:52
145.239.29.217 attackbotsspam
(PERMBLOCK) 145.239.29.217 (PL/Poland/ip-145-239-29.eu) has had more than 4 temp blocks in the last 86400 secs; Ports: *; Direction: inout; Trigger: LF_PERMBLOCK_COUNT; Logs:
2020-09-29 23:35:29
145.239.29.71 attack
(mod_security) mod_security (id:210492) triggered by 145.239.29.71 (FR/France/-): 5 in the last 3600 secs
2020-09-25 03:30:39
145.239.29.71 attack
(mod_security) mod_security (id:210492) triggered by 145.239.29.71 (FR/France/-): 5 in the last 3600 secs
2020-09-24 19:15:18
145.239.29.217 attackbotsspam
145.239.29.217 - - [21/Sep/2020:06:50:02 +0100] "POST /wp-login.php HTTP/1.1" 200 1861 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.29.217 - - [21/Sep/2020:06:50:02 +0100] "POST /wp-login.php HTTP/1.1" 200 1839 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.29.217 - - [21/Sep/2020:06:50:03 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-21 15:37:58
145.239.29.217 attackbots
145.239.29.217 - - [20/Sep/2020:21:50:22 +0100] "POST /wp-login.php HTTP/1.1" 200 2520 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.29.217 - - [20/Sep/2020:21:50:23 +0100] "POST /wp-login.php HTTP/1.1" 200 2572 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.29.217 - - [20/Sep/2020:21:50:23 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-21 07:31:58
145.239.211.242 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-20 14:20:31
145.239.211.242 attackspambots
145.239.211.242 - - [19/Sep/2020:23:10:49 +0100] "POST /wp-login.php HTTP/1.1" 200 2191 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.211.242 - - [19/Sep/2020:23:10:50 +0100] "POST /wp-login.php HTTP/1.1" 200 2173 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.211.242 - - [19/Sep/2020:23:10:50 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-20 06:20:08
145.239.29.217 attack
145.239.29.217 - - [14/Sep/2020:08:51:41 +0200] "GET /wp-login.php HTTP/1.1" 200 8558 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.29.217 - - [14/Sep/2020:08:51:44 +0200] "POST /wp-login.php HTTP/1.1" 200 8809 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.29.217 - - [14/Sep/2020:08:51:44 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-14 23:59:46
145.239.29.217 attackspam
145.239.29.217 - - [14/Sep/2020:08:51:41 +0200] "GET /wp-login.php HTTP/1.1" 200 8558 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.29.217 - - [14/Sep/2020:08:51:44 +0200] "POST /wp-login.php HTTP/1.1" 200 8809 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.29.217 - - [14/Sep/2020:08:51:44 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-14 15:45:13
145.239.29.217 attack
145.239.29.217 - - [13/Sep/2020:18:59:28 +0100] "POST /wp-login.php HTTP/1.1" 200 2401 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.29.217 - - [13/Sep/2020:18:59:29 +0100] "POST /wp-login.php HTTP/1.1" 200 2415 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.29.217 - - [13/Sep/2020:18:59:29 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-14 07:38:29
145.239.29.217 attackspam
GET /wp-login.php HTTP/1.1
2020-09-14 00:21:04
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.239.2.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46903
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.239.2.138.			IN	A

;; AUTHORITY SECTION:
.			223	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020033000 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 00:06:31 CST 2020
;; MSG SIZE  rcvd: 117
Host info
138.2.239.145.in-addr.arpa domain name pointer ns3082071.ip-145-239-2.eu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.2.239.145.in-addr.arpa	name = ns3082071.ip-145-239-2.eu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.125.194.150 attack
2020-06-28T15:07:38.405864galaxy.wi.uni-potsdam.de sshd[16570]: Invalid user test from 123.125.194.150 port 35598
2020-06-28T15:07:38.410872galaxy.wi.uni-potsdam.de sshd[16570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.125.194.150
2020-06-28T15:07:38.405864galaxy.wi.uni-potsdam.de sshd[16570]: Invalid user test from 123.125.194.150 port 35598
2020-06-28T15:07:40.274257galaxy.wi.uni-potsdam.de sshd[16570]: Failed password for invalid user test from 123.125.194.150 port 35598 ssh2
2020-06-28T15:10:52.891683galaxy.wi.uni-potsdam.de sshd[16966]: Invalid user sair from 123.125.194.150 port 49288
2020-06-28T15:10:52.896725galaxy.wi.uni-potsdam.de sshd[16966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.125.194.150
2020-06-28T15:10:52.891683galaxy.wi.uni-potsdam.de sshd[16966]: Invalid user sair from 123.125.194.150 port 49288
2020-06-28T15:10:54.393655galaxy.wi.uni-potsdam.de sshd[16966]: Faile
...
2020-06-28 22:36:21
115.84.92.181 attackspambots
(imapd) Failed IMAP login from 115.84.92.181 (LA/Laos/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jun 28 16:43:03 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=115.84.92.181, lip=5.63.12.44, TLS: Connection closed, session=
2020-06-28 22:28:14
68.183.148.159 attack
Jun 28 12:13:11 vps1 sshd[1993277]: Invalid user mgu from 68.183.148.159 port 43676
Jun 28 12:13:13 vps1 sshd[1993277]: Failed password for invalid user mgu from 68.183.148.159 port 43676 ssh2
...
2020-06-28 22:35:23
194.1.188.84 attackspam
Jun 28 14:35:03 mail sshd\[19884\]: Invalid user admin from 194.1.188.84
Jun 28 14:35:04 mail sshd\[19884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.1.188.84
Jun 28 14:35:05 mail sshd\[19884\]: Failed password for invalid user admin from 194.1.188.84 port 55498 ssh2
2020-06-28 22:04:10
110.89.122.110 attackbotsspam
Jun 28 15:19:32 [host] sshd[29394]: pam_unix(sshd:
Jun 28 15:19:34 [host] sshd[29394]: Failed passwor
Jun 28 15:29:22 [host] sshd[29884]: Invalid user a
2020-06-28 22:09:10
43.248.126.124 attack
Jun 28 10:08:53 ny01 sshd[29827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.248.126.124
Jun 28 10:08:55 ny01 sshd[29827]: Failed password for invalid user admin from 43.248.126.124 port 48440 ssh2
Jun 28 10:12:42 ny01 sshd[30291]: Failed password for root from 43.248.126.124 port 58602 ssh2
2020-06-28 22:23:08
198.46.152.161 attackspambots
Jun 28 15:52:32 electroncash sshd[32359]: Invalid user xcc from 198.46.152.161 port 60812
Jun 28 15:52:32 electroncash sshd[32359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.46.152.161 
Jun 28 15:52:32 electroncash sshd[32359]: Invalid user xcc from 198.46.152.161 port 60812
Jun 28 15:52:34 electroncash sshd[32359]: Failed password for invalid user xcc from 198.46.152.161 port 60812 ssh2
Jun 28 15:56:27 electroncash sshd[33394]: Invalid user wjh from 198.46.152.161 port 60076
...
2020-06-28 22:05:52
109.166.128.209 attackspam
Automatic report - XMLRPC Attack
2020-06-28 22:36:49
51.178.138.125 attackspam
2020-06-28T14:08:42.738631randservbullet-proofcloud-66.localdomain sshd[12185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-192d0a69.vps.ovh.net  user=root
2020-06-28T14:08:45.276776randservbullet-proofcloud-66.localdomain sshd[12185]: Failed password for root from 51.178.138.125 port 41902 ssh2
2020-06-28T14:25:04.351960randservbullet-proofcloud-66.localdomain sshd[12287]: Invalid user mhj from 51.178.138.125 port 57702
...
2020-06-28 22:27:03
115.124.86.106 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-28 22:08:55
139.59.241.75 attackbots
Jun 28 15:02:52 cp sshd[1872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.241.75
2020-06-28 22:03:01
68.183.230.47 attackspam
2020-06-28T12:13:17.079878abusebot.cloudsearch.cf sshd[29269]: Invalid user andreas from 68.183.230.47 port 37578
2020-06-28T12:13:17.085213abusebot.cloudsearch.cf sshd[29269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.230.47
2020-06-28T12:13:17.079878abusebot.cloudsearch.cf sshd[29269]: Invalid user andreas from 68.183.230.47 port 37578
2020-06-28T12:13:19.270100abusebot.cloudsearch.cf sshd[29269]: Failed password for invalid user andreas from 68.183.230.47 port 37578 ssh2
2020-06-28T12:16:11.395139abusebot.cloudsearch.cf sshd[29291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.230.47  user=root
2020-06-28T12:16:13.133503abusebot.cloudsearch.cf sshd[29291]: Failed password for root from 68.183.230.47 port 39082 ssh2
2020-06-28T12:17:01.731629abusebot.cloudsearch.cf sshd[29297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.230.47  use
...
2020-06-28 22:07:38
129.204.38.234 attack
Jun 28 14:01:25 Invalid user owj from 129.204.38.234 port 33816
2020-06-28 22:04:50
212.70.149.34 attackbots
2020-06-28 02:42:51 dovecot_login authenticator failed for \(User\) \[212.70.149.34\]: 535 Incorrect authentication data \(set_id=dwayne@no-server.de\)
2020-06-28 02:43:10 dovecot_login authenticator failed for \(User\) \[212.70.149.34\]: 535 Incorrect authentication data \(set_id=dwayne@no-server.de\)
2020-06-28 02:43:15 dovecot_login authenticator failed for \(User\) \[212.70.149.34\]: 535 Incorrect authentication data \(set_id=dwayne@no-server.de\)
2020-06-28 02:43:18 dovecot_login authenticator failed for \(User\) \[212.70.149.34\]: 535 Incorrect authentication data \(set_id=dwayne@no-server.de\)
2020-06-28 02:43:27 dovecot_login authenticator failed for \(User\) \[212.70.149.34\]: 535 Incorrect authentication data \(set_id=dwight@no-server.de\)
2020-06-28 02:43:44 dovecot_login authenticator failed for \(User\) \[212.70.149.34\]: 535 Incorrect authentication data \(set_id=dwight@no-server.de\)
2020-06-28 02:43:50 dovecot_login authenticator failed for \(User\) \[212.70.149.34\]: 5
...
2020-06-28 21:59:29
185.176.27.242 attackspambots
06/28/2020-09:54:45.527562 185.176.27.242 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-28 21:57:16

Recently Reported IPs

82.137.151.144 229.84.209.137 218.153.6.233 186.42.132.145
12.19.77.153 116.76.83.216 243.151.178.42 64.39.166.93
3.92.224.101 239.26.129.192 231.180.177.235 1.67.200.246
97.38.247.158 94.101.25.167 181.183.153.120 111.182.12.185
116.106.145.56 223.68.10.16 114.252.230.245 223.66.214.118