Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.251.190.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6915
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.251.190.142.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 16:40:40 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 142.190.251.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.190.251.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
74.208.178.100 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-28 21:55:51
111.230.73.133 attackbotsspam
Invalid user aimo from 111.230.73.133 port 57502
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.73.133
Failed password for invalid user aimo from 111.230.73.133 port 57502 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.73.133  user=root
Failed password for root from 111.230.73.133 port 53770 ssh2
2019-12-28 21:57:20
185.105.237.31 attackspam
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(12281307)
2019-12-28 22:10:09
187.189.233.198 attack
Honeypot attack, port: 445, PTR: fixed-187-189-233-198.totalplay.net.
2019-12-28 22:06:13
118.24.107.39 attack
Dec 28 15:01:20 master sshd[28874]: Failed password for invalid user server from 118.24.107.39 port 55512 ssh2
2019-12-28 22:07:44
106.12.13.247 attackbots
Dec 28 09:07:23 serwer sshd\[11979\]: Invalid user zut from 106.12.13.247 port 41850
Dec 28 09:07:23 serwer sshd\[11979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.247
Dec 28 09:07:25 serwer sshd\[11979\]: Failed password for invalid user zut from 106.12.13.247 port 41850 ssh2
...
2019-12-28 21:51:59
182.160.102.110 attack
Honeypot attack, port: 445, PTR: 182-160-102-110.aamranetworks.com.
2019-12-28 21:50:58
103.103.128.61 attackbots
$f2bV_matches
2019-12-28 22:14:26
140.143.200.251 attack
Dec 27 20:59:40 web9 sshd\[11564\]: Invalid user server from 140.143.200.251
Dec 27 20:59:40 web9 sshd\[11564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.200.251
Dec 27 20:59:42 web9 sshd\[11564\]: Failed password for invalid user server from 140.143.200.251 port 38132 ssh2
Dec 27 21:03:56 web9 sshd\[12212\]: Invalid user hauen from 140.143.200.251
Dec 27 21:03:56 web9 sshd\[12212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.200.251
2019-12-28 22:11:46
210.242.67.17 attackbots
Dec 28 13:47:54 sd-53420 sshd\[4950\]: Invalid user rpm from 210.242.67.17
Dec 28 13:47:54 sd-53420 sshd\[4950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.242.67.17
Dec 28 13:47:56 sd-53420 sshd\[4950\]: Failed password for invalid user rpm from 210.242.67.17 port 49462 ssh2
Dec 28 13:51:16 sd-53420 sshd\[6385\]: User root from 210.242.67.17 not allowed because none of user's groups are listed in AllowGroups
Dec 28 13:51:16 sd-53420 sshd\[6385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.242.67.17  user=root
...
2019-12-28 21:50:10
8.2.215.75 attackbotsspam
Honeypot attack, port: 23, PTR: 8-2-215-75.dsl-local.livingston.net.
2019-12-28 21:54:34
77.81.230.143 attackbots
2019-12-28T13:33:04.519775shield sshd\[18682\]: Invalid user ghirardi from 77.81.230.143 port 60316
2019-12-28T13:33:04.526270shield sshd\[18682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.81.230.143
2019-12-28T13:33:06.500815shield sshd\[18682\]: Failed password for invalid user ghirardi from 77.81.230.143 port 60316 ssh2
2019-12-28T13:41:28.457429shield sshd\[20461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.81.230.143  user=root
2019-12-28T13:41:29.955203shield sshd\[20461\]: Failed password for root from 77.81.230.143 port 58668 ssh2
2019-12-28 21:45:41
77.247.109.56 attackbotsspam
Dec 28 08:53:43 debian-2gb-nbg1-2 kernel: \[1172342.404845\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=77.247.109.56 DST=195.201.40.59 LEN=433 TOS=0x00 PREC=0x00 TTL=54 ID=23670 DF PROTO=UDP SPT=5083 DPT=10020 LEN=413
2019-12-28 21:53:43
185.209.0.91 attack
Dec 28 14:18:38 debian-2gb-nbg1-2 kernel: \[1191836.383232\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.209.0.91 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=22732 PROTO=TCP SPT=54735 DPT=43000 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-28 22:08:22
43.255.84.13 attackspambots
Unauthorized connection attempt detected from IP address 43.255.84.13 to port 23
2019-12-28 22:04:11

Recently Reported IPs

132.160.178.166 119.133.174.3 204.185.126.185 149.239.117.17
171.166.194.146 9.97.146.135 169.5.148.176 217.208.56.32
226.191.38.193 47.165.71.249 193.34.67.61 9.31.77.128
22.3.164.35 9.24.238.179 70.94.238.143 70.147.126.110
122.48.122.58 243.36.166.105 79.170.6.246 225.65.30.87