Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.249.124.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51773
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.249.124.147.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 01:58:58 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 147.124.249.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.124.249.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
186.155.19.178 attack
Icarus honeypot on github
2020-09-24 22:19:27
94.155.33.133 attackspam
Fail2Ban Ban Triggered
2020-09-24 22:49:04
204.102.76.37 attackbotsspam
port scan and connect, tcp 443 (https)
2020-09-24 22:37:15
218.92.0.133 attackbotsspam
Sep 24 11:34:33 shivevps sshd[17068]: error: maximum authentication attempts exceeded for root from 218.92.0.133 port 29150 ssh2 [preauth]
Sep 24 11:34:41 shivevps sshd[17070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
Sep 24 11:34:43 shivevps sshd[17070]: Failed password for root from 218.92.0.133 port 53245 ssh2
...
2020-09-24 22:36:39
1.64.192.226 attackspam
Sep 23 20:07:45 ssh2 sshd[73099]: User root from 1-64-192-226.static.netvigator.com not allowed because not listed in AllowUsers
Sep 23 20:07:45 ssh2 sshd[73099]: Failed password for invalid user root from 1.64.192.226 port 40506 ssh2
Sep 23 20:07:45 ssh2 sshd[73099]: Connection closed by invalid user root 1.64.192.226 port 40506 [preauth]
...
2020-09-24 22:33:40
115.53.229.2 attackspambots
Port Scan: UDP/4000
2020-09-24 22:44:49
2a02:1810:1d1b:fe00:d013:3d3c:e901:1f1a attack
C2,WP GET /wp-login.php
2020-09-24 22:15:23
210.211.96.155 attackspambots
Invalid user test2 from 210.211.96.155 port 44590
2020-09-24 22:21:32
124.112.228.188 attackbotsspam
Listed on    zen-spamhaus   / proto=6  .  srcport=36165  .  dstport=1433  .     (2890)
2020-09-24 22:47:17
181.36.244.84 attack
Automatic report - Banned IP Access
2020-09-24 22:30:01
183.109.124.137 attack
2020-09-24T13:37:54.598432cyberdyne sshd[863247]: Invalid user backup from 183.109.124.137 port 50415
2020-09-24T13:37:54.605796cyberdyne sshd[863247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.109.124.137
2020-09-24T13:37:54.598432cyberdyne sshd[863247]: Invalid user backup from 183.109.124.137 port 50415
2020-09-24T13:37:56.278019cyberdyne sshd[863247]: Failed password for invalid user backup from 183.109.124.137 port 50415 ssh2
...
2020-09-24 22:18:17
94.102.57.181 attackspambots
[H1.VM4] Blocked by UFW
2020-09-24 22:43:26
4.17.231.196 attackbotsspam
Invalid user ami from 4.17.231.196 port 30404
2020-09-24 22:15:50
85.117.82.3 attackspambots
1600880642 - 09/23/2020 19:04:02 Host: 85.117.82.3/85.117.82.3 Port: 445 TCP Blocked
2020-09-24 22:34:30
196.37.111.217 attackspambots
$f2bV_matches
2020-09-24 22:43:12

Recently Reported IPs

254.225.206.22 121.192.180.40 130.80.229.129 70.151.59.27
97.88.70.209 181.71.26.117 196.253.135.49 160.0.19.207
133.198.87.96 217.138.207.131 139.93.60.132 99.191.207.232
91.90.240.108 87.131.15.239 131.242.116.169 93.13.114.139
205.244.235.236 164.85.218.241 254.179.91.120 226.71.187.231