Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.242.161.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47199
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.242.161.229.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 00:02:45 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 229.161.242.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 229.161.242.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
116.0.56.58 attack
Unauthorized connection attempt from IP address 116.0.56.58 on Port 445(SMB)
2019-11-02 01:48:02
36.225.157.243 attackbots
Unauthorized connection attempt from IP address 36.225.157.243 on Port 445(SMB)
2019-11-02 01:44:09
54.39.187.138 attackbotsspam
Nov  1 07:30:11 web1 sshd\[20411\]: Invalid user bao from 54.39.187.138
Nov  1 07:30:11 web1 sshd\[20411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.187.138
Nov  1 07:30:13 web1 sshd\[20411\]: Failed password for invalid user bao from 54.39.187.138 port 39981 ssh2
Nov  1 07:33:40 web1 sshd\[20750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.187.138  user=root
Nov  1 07:33:42 web1 sshd\[20750\]: Failed password for root from 54.39.187.138 port 59457 ssh2
2019-11-02 01:36:59
68.183.190.34 attackspambots
2019-11-01T13:04:07.798150  sshd[4587]: Invalid user !@#QWERTYUIOP from 68.183.190.34 port 52228
2019-11-01T13:04:07.813162  sshd[4587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.190.34
2019-11-01T13:04:07.798150  sshd[4587]: Invalid user !@#QWERTYUIOP from 68.183.190.34 port 52228
2019-11-01T13:04:09.844647  sshd[4587]: Failed password for invalid user !@#QWERTYUIOP from 68.183.190.34 port 52228 ssh2
2019-11-01T13:09:00.752459  sshd[4616]: Invalid user moguls from 68.183.190.34 port 34348
...
2019-11-02 01:19:27
73.109.11.25 attack
Nov  1 15:24:26 server sshd\[28977\]: Invalid user cn from 73.109.11.25 port 44846
Nov  1 15:24:26 server sshd\[28977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.109.11.25
Nov  1 15:24:28 server sshd\[28977\]: Failed password for invalid user cn from 73.109.11.25 port 44846 ssh2
Nov  1 15:27:48 server sshd\[18190\]: Invalid user Marcela2017 from 73.109.11.25 port 49738
Nov  1 15:27:48 server sshd\[18190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.109.11.25
2019-11-02 01:42:40
148.70.192.84 attack
Nov  1 23:47:57 webhost01 sshd[14788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.192.84
Nov  1 23:47:59 webhost01 sshd[14788]: Failed password for invalid user passwordaa!@# from 148.70.192.84 port 38942 ssh2
...
2019-11-02 01:33:32
176.199.255.9 attackbots
$f2bV_matches
2019-11-02 01:22:10
118.89.189.176 attackbots
Nov  1 13:18:32 sd-53420 sshd\[7904\]: Invalid user 1Admin! from 118.89.189.176
Nov  1 13:18:32 sd-53420 sshd\[7904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.189.176
Nov  1 13:18:34 sd-53420 sshd\[7904\]: Failed password for invalid user 1Admin! from 118.89.189.176 port 48676 ssh2
Nov  1 13:23:53 sd-53420 sshd\[8259\]: Invalid user upload1 from 118.89.189.176
Nov  1 13:23:53 sd-53420 sshd\[8259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.189.176
...
2019-11-02 01:34:52
94.230.140.134 attackspambots
SMB Server BruteForce Attack
2019-11-02 01:10:25
107.170.244.110 attack
Nov  1 13:21:30 cp sshd[10289]: Failed password for root from 107.170.244.110 port 37764 ssh2
Nov  1 13:21:30 cp sshd[10289]: Failed password for root from 107.170.244.110 port 37764 ssh2
2019-11-02 01:38:39
104.42.158.117 attackspam
(sshd) Failed SSH login from 104.42.158.117 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov  1 12:21:33 server2 sshd[12482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.42.158.117  user=root
Nov  1 12:21:34 server2 sshd[12482]: Failed password for root from 104.42.158.117 port 45824 ssh2
Nov  1 12:43:40 server2 sshd[13004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.42.158.117  user=root
Nov  1 12:43:42 server2 sshd[13004]: Failed password for root from 104.42.158.117 port 45824 ssh2
Nov  1 12:47:15 server2 sshd[13095]: Invalid user craig from 104.42.158.117 port 45824
2019-11-02 01:30:26
186.189.233.28 attackspam
Automatic report - Banned IP Access
2019-11-02 01:27:46
120.52.121.86 attackspam
SSH bruteforce
2019-11-02 01:17:15
185.175.93.3 attack
11/01/2019-13:01:31.768636 185.175.93.3 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-02 01:10:46
216.45.23.6 attackspambots
Nov  1 12:47:54 MK-Soft-VM4 sshd[30425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.45.23.6 
Nov  1 12:47:56 MK-Soft-VM4 sshd[30425]: Failed password for invalid user holly from 216.45.23.6 port 47188 ssh2
...
2019-11-02 01:08:12

Recently Reported IPs

194.223.227.156 236.41.167.126 189.7.150.64 247.212.143.148
225.34.159.130 161.184.201.173 60.194.183.231 167.234.77.224
160.229.173.10 209.202.147.164 188.151.197.240 72.211.20.253
8.93.94.17 214.101.192.17 238.112.48.144 107.142.10.12
91.80.120.151 59.83.223.146 226.8.71.172 195.35.27.139