Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.253.158.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17503
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.253.158.41.			IN	A

;; AUTHORITY SECTION:
.			366	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:34:31 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 41.158.253.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 41.158.253.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.183 attack
Nov 11 20:48:27 dcd-gentoo sshd[11895]: User root from 222.186.173.183 not allowed because none of user's groups are listed in AllowGroups
Nov 11 20:48:36 dcd-gentoo sshd[11895]: error: PAM: Authentication failure for illegal user root from 222.186.173.183
Nov 11 20:48:27 dcd-gentoo sshd[11895]: User root from 222.186.173.183 not allowed because none of user's groups are listed in AllowGroups
Nov 11 20:48:36 dcd-gentoo sshd[11895]: error: PAM: Authentication failure for illegal user root from 222.186.173.183
Nov 11 20:48:27 dcd-gentoo sshd[11895]: User root from 222.186.173.183 not allowed because none of user's groups are listed in AllowGroups
Nov 11 20:48:36 dcd-gentoo sshd[11895]: error: PAM: Authentication failure for illegal user root from 222.186.173.183
Nov 11 20:48:36 dcd-gentoo sshd[11895]: Failed keyboard-interactive/pam for invalid user root from 222.186.173.183 port 36072 ssh2
...
2019-11-12 03:57:05
49.73.235.149 attackspam
Nov 11 18:24:55 meumeu sshd[2732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.73.235.149 
Nov 11 18:24:57 meumeu sshd[2732]: Failed password for invalid user anarchy from 49.73.235.149 port 35733 ssh2
Nov 11 18:29:03 meumeu sshd[3272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.73.235.149 
...
2019-11-12 03:42:58
80.82.77.227 attack
11/11/2019-13:26:27.128736 80.82.77.227 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-12 04:11:14
163.172.223.186 attack
Nov 11 10:11:28 xb0 sshd[6071]: Failed password for invalid user guest from 163.172.223.186 port 57020 ssh2
Nov 11 10:11:28 xb0 sshd[6071]: Received disconnect from 163.172.223.186: 11: Bye Bye [preauth]
Nov 11 10:52:00 xb0 sshd[15530]: Failed password for invalid user so from 163.172.223.186 port 47198 ssh2
Nov 11 10:52:00 xb0 sshd[15530]: Received disconnect from 163.172.223.186: 11: Bye Bye [preauth]
Nov 11 10:55:38 xb0 sshd[12962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.223.186  user=nobody
Nov 11 10:55:40 xb0 sshd[12962]: Failed password for nobody from 163.172.223.186 port 55958 ssh2
Nov 11 10:55:40 xb0 sshd[12962]: Received disconnect from 163.172.223.186: 11: Bye Bye [preauth]
Nov 11 10:59:16 xb0 sshd[23863]: Failed password for invalid user corbet from 163.172.223.186 port 36494 ssh2
Nov 11 10:59:16 xb0 sshd[23863]: Received disconnect from 163.172.223.186: 11: Bye Bye [preauth]
Nov 11 11:02:40 xb0 sshd[2........
-------------------------------
2019-11-12 03:59:31
193.8.194.11 attackspambots
Autoban   193.8.194.11 AUTH/CONNECT
2019-11-12 03:47:18
54.36.214.76 attack
2019-11-11T20:54:06.313997mail01 postfix/smtpd[29194]: warning: ip76.ip-54-36-214.eu[54.36.214.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-11T20:54:38.228201mail01 postfix/smtpd[29092]: warning: ip76.ip-54-36-214.eu[54.36.214.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-11T20:55:22.362693mail01 postfix/smtpd[29194]: warning: ip76.ip-54-36-214.eu[54.36.214.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-11T20:55:22.363064mail01 postfix/smtpd[29092]: warning: ip76.ip-54-36-214.eu[54.36.214.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-12 04:08:51
207.154.206.212 attack
Nov 11 11:21:40 TORMINT sshd\[31401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.206.212  user=root
Nov 11 11:21:42 TORMINT sshd\[31401\]: Failed password for root from 207.154.206.212 port 34376 ssh2
Nov 11 11:25:27 TORMINT sshd\[31526\]: Invalid user cd from 207.154.206.212
Nov 11 11:25:27 TORMINT sshd\[31526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.206.212
...
2019-11-12 03:36:18
81.84.235.209 attack
Nov 11 18:02:06 server sshd\[20508\]: Invalid user avis from 81.84.235.209
Nov 11 18:02:06 server sshd\[20508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns4.portugalinteractivo.pt 
Nov 11 18:02:08 server sshd\[20508\]: Failed password for invalid user avis from 81.84.235.209 port 43088 ssh2
Nov 11 22:24:34 server sshd\[24203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns4.portugalinteractivo.pt  user=root
Nov 11 22:24:36 server sshd\[24203\]: Failed password for root from 81.84.235.209 port 57138 ssh2
...
2019-11-12 04:01:40
149.202.65.173 attackspambots
Nov 11 11:46:25 srv3 sshd\[25712\]: Invalid user randem from 149.202.65.173
Nov 11 11:46:25 srv3 sshd\[25712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.65.173
Nov 11 11:46:27 srv3 sshd\[25712\]: Failed password for invalid user randem from 149.202.65.173 port 49610 ssh2
...
2019-11-12 03:44:15
81.22.45.115 attack
Nov 11 20:38:11 mc1 kernel: \[4787373.053985\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.115 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=59937 PROTO=TCP SPT=40293 DPT=853 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 11 20:39:20 mc1 kernel: \[4787441.284003\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.115 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=25833 PROTO=TCP SPT=40293 DPT=1929 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 11 20:44:23 mc1 kernel: \[4787745.112304\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.115 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=51016 PROTO=TCP SPT=40293 DPT=1115 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-12 04:02:05
103.119.30.52 attack
Nov 11 20:46:03 markkoudstaal sshd[11568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.30.52
Nov 11 20:46:05 markkoudstaal sshd[11568]: Failed password for invalid user axiao from 103.119.30.52 port 55796 ssh2
Nov 11 20:50:21 markkoudstaal sshd[11927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.30.52
2019-11-12 03:56:31
82.149.194.134 attackspam
" "
2019-11-12 03:55:53
35.194.97.84 attackspam
C1,WP GET /suche/wp-login.php
2019-11-12 03:36:01
183.82.2.251 attackspam
SSH Brute Force
2019-11-12 03:34:26
76.73.206.90 attackbots
SSH Brute Force
2019-11-12 03:42:07

Recently Reported IPs

145.250.210.164 145.255.13.223 145.253.183.38 145.255.2.200
145.255.163.156 145.253.155.217 145.255.2.27 145.253.155.222
145.255.192.20 145.255.26.236 145.255.253.54 145.255.5.119
145.255.4.114 145.32.64.9 145.40.77.242 145.40.77.93
145.40.77.97 145.40.78.109 145.40.78.111 145.40.118.122