Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.239.66.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32165
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.239.66.201.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:18:12 CST 2022
;; MSG SIZE  rcvd: 107
Host info
201.66.239.145.in-addr.arpa domain name pointer adcf.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
201.66.239.145.in-addr.arpa	name = adcf.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.171 attackbotsspam
Jun 23 03:07:36 firewall sshd[32583]: Failed password for root from 218.92.0.171 port 1949 ssh2
Jun 23 03:07:39 firewall sshd[32583]: Failed password for root from 218.92.0.171 port 1949 ssh2
Jun 23 03:07:42 firewall sshd[32583]: Failed password for root from 218.92.0.171 port 1949 ssh2
...
2020-06-23 14:18:24
111.72.195.83 attackspam
Jun 23 06:16:57 srv01 postfix/smtpd\[8874\]: warning: unknown\[111.72.195.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 23 06:17:09 srv01 postfix/smtpd\[8874\]: warning: unknown\[111.72.195.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 23 06:17:26 srv01 postfix/smtpd\[8874\]: warning: unknown\[111.72.195.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 23 06:17:45 srv01 postfix/smtpd\[8874\]: warning: unknown\[111.72.195.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 23 06:17:56 srv01 postfix/smtpd\[8874\]: warning: unknown\[111.72.195.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-23 14:48:35
85.209.0.121 attack
Automatic report - Port Scan
2020-06-23 14:35:10
178.33.181.224 spam
SPAM, like Email Spam, Web Spam, etc.
2020-06-23 14:15:51
192.241.212.49 attackbotsspam
trying to access non-authorized port
2020-06-23 14:45:49
180.108.196.203 attackbots
Invalid user utente from 180.108.196.203 port 25797
2020-06-23 14:53:17
182.61.55.154 attack
Jun 23 03:02:13 firewall sshd[32446]: Invalid user czt from 182.61.55.154
Jun 23 03:02:15 firewall sshd[32446]: Failed password for invalid user czt from 182.61.55.154 port 33174 ssh2
Jun 23 03:05:43 firewall sshd[32532]: Invalid user cal from 182.61.55.154
...
2020-06-23 14:32:10
128.199.192.53 attack
Jun 23 08:36:01 pkdns2 sshd\[37255\]: Invalid user fabien from 128.199.192.53Jun 23 08:36:03 pkdns2 sshd\[37255\]: Failed password for invalid user fabien from 128.199.192.53 port 11404 ssh2Jun 23 08:40:02 pkdns2 sshd\[37393\]: Invalid user mkt from 128.199.192.53Jun 23 08:40:04 pkdns2 sshd\[37393\]: Failed password for invalid user mkt from 128.199.192.53 port 6711 ssh2Jun 23 08:44:08 pkdns2 sshd\[37622\]: Invalid user helix from 128.199.192.53Jun 23 08:44:11 pkdns2 sshd\[37622\]: Failed password for invalid user helix from 128.199.192.53 port 2016 ssh2
...
2020-06-23 14:19:50
192.241.224.229 attackbots
Port Scan detected!
...
2020-06-23 14:46:57
96.32.184.42 attack
96.32.184.42 - - MISS [23/Jun/2020:05:54:56 +0200] "GET /incredibly-messy-cock-sucking/ykrDJpv5 HTTP/1.1" 200 852 "-" "Mozilla/5.0 (iPad; CPU OS 12_4_5 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.1.2 Mobile/15E148 Safari/604.1" "96.32.184.42" "-"
2020-06-23 14:33:53
61.183.144.188 attackspam
Brute force attempt
2020-06-23 14:36:21
46.38.150.142 attackbots
2020-06-23 05:59:26 auth_plain authenticator failed for (User) [46.38.150.142]: 535 Incorrect authentication data (set_id=akane@csmailer.org)
2020-06-23 05:59:57 auth_plain authenticator failed for (User) [46.38.150.142]: 535 Incorrect authentication data (set_id=johnson@csmailer.org)
2020-06-23 06:00:27 auth_plain authenticator failed for (User) [46.38.150.142]: 535 Incorrect authentication data (set_id=crimson@csmailer.org)
2020-06-23 06:00:57 auth_plain authenticator failed for (User) [46.38.150.142]: 535 Incorrect authentication data (set_id=videoType@csmailer.org)
2020-06-23 06:01:27 auth_plain authenticator failed for (User) [46.38.150.142]: 535 Incorrect authentication data (set_id=conference@csmailer.org)
...
2020-06-23 14:17:20
45.79.122.36 attackspambots
Port scan denied
2020-06-23 14:52:21
185.220.102.4 attackbots
2020-06-22 22:54:47.872912-0500  localhost sshd[93612]: Failed password for root from 185.220.102.4 port 46185 ssh2
2020-06-23 14:46:34
51.83.33.88 attackspambots
2020-06-23T01:17:40.103436xentho-1 sshd[600889]: Invalid user emmanuel from 51.83.33.88 port 34518
2020-06-23T01:17:40.109736xentho-1 sshd[600889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.33.88
2020-06-23T01:17:40.103436xentho-1 sshd[600889]: Invalid user emmanuel from 51.83.33.88 port 34518
2020-06-23T01:17:41.805354xentho-1 sshd[600889]: Failed password for invalid user emmanuel from 51.83.33.88 port 34518 ssh2
2020-06-23T01:19:35.351931xentho-1 sshd[600926]: Invalid user alex from 51.83.33.88 port 40394
2020-06-23T01:19:35.358086xentho-1 sshd[600926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.33.88
2020-06-23T01:19:35.351931xentho-1 sshd[600926]: Invalid user alex from 51.83.33.88 port 40394
2020-06-23T01:19:37.174123xentho-1 sshd[600926]: Failed password for invalid user alex from 51.83.33.88 port 40394 ssh2
2020-06-23T01:21:34.770982xentho-1 sshd[600946]: pam_unix(sshd:auth): 
...
2020-06-23 14:14:19

Recently Reported IPs

145.239.7.138 145.239.54.217 145.239.7.12 145.239.62.157
145.239.8.16 145.239.81.49 145.239.80.160 145.239.8.76
145.239.82.44 145.239.84.232 145.239.89.114 145.239.9.108
145.239.87.114 145.239.90.255 145.239.91.21 145.239.92.116
145.249.71.172 145.252.0.138 145.253.101.123 145.249.124.126