Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: OJSC Ufanet

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbots
Feb 21 10:15:41 plusreed sshd[31879]: Invalid user telnet from 145.255.0.50
...
2020-02-21 23:30:24
Comments on same subnet:
IP Type Details Datetime
145.255.0.161 attack
/viewforum.php?f=3
2020-03-12 08:10:38
145.255.0.44 attackbotsspam
Unauthorized connection attempt detected from IP address 145.255.0.44 to port 8080
2019-12-31 01:57:49
145.255.0.40 attackbots
Unauthorized connection attempt detected from IP address 145.255.0.40 to port 445
2019-12-28 03:17:05
145.255.0.125 attack
2019-07-09T09:42:57.462840stt-1.[munged] kernel: [6711399.171391] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:aa:c1:08:00 SRC=145.255.0.125 DST=[mungedIP1] LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=10720 DF PROTO=TCP SPT=61603 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
2019-07-09T09:43:00.457687stt-1.[munged] kernel: [6711402.166222] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:aa:c1:08:00 SRC=145.255.0.125 DST=[mungedIP1] LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=14767 DF PROTO=TCP SPT=61603 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
2019-07-09T09:43:06.458777stt-1.[munged] kernel: [6711408.167294] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:aa:c1:08:00 SRC=145.255.0.125 DST=[mungedIP1] LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=20137 DF PROTO=TCP SPT=61603 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0
2019-07-09 23:06:09
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.255.0.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11631
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.255.0.50.			IN	A

;; AUTHORITY SECTION:
.			594	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022100 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 23:30:17 CST 2020
;; MSG SIZE  rcvd: 116
Host info
50.0.255.145.in-addr.arpa domain name pointer 145.255.0.50.dynamic.ufanet.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.0.255.145.in-addr.arpa	name = 145.255.0.50.dynamic.ufanet.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.231.54.33 attackbotsspam
Jul  1 19:41:14 vayu sshd[898329]: Invalid user hadoop from 111.231.54.33
Jul  1 19:41:14 vayu sshd[898329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.54.33 
Jul  1 19:41:16 vayu sshd[898329]: Failed password for invalid user hadoop from 111.231.54.33 port 46304 ssh2
Jul  1 19:41:16 vayu sshd[898329]: Received disconnect from 111.231.54.33: 11: Bye Bye [preauth]
Jul  1 19:45:04 vayu sshd[900122]: Invalid user gateway from 111.231.54.33
Jul  1 19:45:04 vayu sshd[900122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.54.33 
Jul  1 19:45:07 vayu sshd[900122]: Failed password for invalid user gateway from 111.231.54.33 port 51150 ssh2
Jul  1 19:45:07 vayu sshd[900122]: Received disconnect from 111.231.54.33: 11: Bye Bye [preauth]
Jul  1 19:46:54 vayu sshd[901202]: Invalid user ghostname from 111.231.54.33
Jul  1 19:46:54 vayu sshd[901202]: pam_unix(sshd:auth): authenticat........
-------------------------------
2019-07-08 06:16:45
115.153.14.154 attackspambots
2019-07-08T00:11:07.105570mail01 postfix/smtpd[25366]: warning: unknown[115.153.14.154]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-08T00:11:14.290023mail01 postfix/smtpd[19025]: warning: unknown[115.153.14.154]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-08T00:11:26.094853mail01 postfix/smtpd[25366]: warning: unknown[115.153.14.154]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-08 06:19:59
183.131.82.99 attackspam
Jul  8 00:18:16 core01 sshd\[31883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.131.82.99  user=root
Jul  8 00:18:18 core01 sshd\[31883\]: Failed password for root from 183.131.82.99 port 39362 ssh2
...
2019-07-08 06:22:53
190.65.220.94 attackbotsspam
Jul  7 20:45:24 **** sshd[10228]: Invalid user cathy from 190.65.220.94 port 55075
2019-07-08 06:19:01
27.69.5.90 attackspambots
WordPress XMLRPC scan :: 27.69.5.90 1.184 BYPASS [07/Jul/2019:23:26:45  1000] www.[censored_1] "POST /xmlrpc.php HTTP/1.1" 200 382 "https://www.[censored_1]/" "PHP/5.2.69"
2019-07-08 06:02:32
218.208.1.2 attackspam
19/7/7@09:24:53: FAIL: Alarm-Intrusion address from=218.208.1.2
...
2019-07-08 06:34:40
163.172.28.200 attack
2019-07-07T16:56:24.396406abusebot-5.cloudsearch.cf sshd\[9534\]: Invalid user s from 163.172.28.200 port 57024
2019-07-08 06:19:29
193.32.161.19 attack
firewall-block, port(s): 8888/tcp, 63389/tcp
2019-07-08 06:02:10
121.244.95.61 attackspam
Jul  1 20:44:40 xxxxxxx8434580 sshd[24945]: reveeclipse mapping checking getaddrinfo for 121.244.95.61.static-banglore.vsnl.net.in [121.244.95.61] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul  1 20:44:40 xxxxxxx8434580 sshd[24945]: Invalid user super from 121.244.95.61
Jul  1 20:44:40 xxxxxxx8434580 sshd[24945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.244.95.61 
Jul  1 20:44:41 xxxxxxx8434580 sshd[24945]: Failed password for invalid user super from 121.244.95.61 port 2893 ssh2
Jul  1 20:44:42 xxxxxxx8434580 sshd[24945]: Received disconnect from 121.244.95.61: 11: Bye Bye [preauth]
Jul  1 20:47:01 xxxxxxx8434580 sshd[24984]: reveeclipse mapping checking getaddrinfo for 121.244.95.61.static-banglore.vsnl.net.in [121.244.95.61] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul  1 20:47:01 xxxxxxx8434580 sshd[24984]: Invalid user lada from 121.244.95.61
Jul  1 20:47:01 xxxxxxx8434580 sshd[24984]: pam_unix(sshd:auth): authentication failu........
-------------------------------
2019-07-08 06:23:21
206.189.165.94 attackbotsspam
Brute force attempt
2019-07-08 05:56:49
66.212.168.13 attack
19/7/7@09:24:40: FAIL: Alarm-Intrusion address from=66.212.168.13
...
2019-07-08 06:40:06
129.150.112.159 attack
SSH Brute Force, server-1 sshd[1388]: Failed password for invalid user copy from 129.150.112.159 port 58218 ssh2
2019-07-08 06:29:39
106.47.29.234 attackspam
400 BAD REQUEST
2019-07-08 06:27:59
158.69.112.95 attack
Jul  7 20:33:29 herz-der-gamer sshd[22821]: Invalid user system from 158.69.112.95 port 42890
Jul  7 20:33:29 herz-der-gamer sshd[22821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.112.95
Jul  7 20:33:29 herz-der-gamer sshd[22821]: Invalid user system from 158.69.112.95 port 42890
Jul  7 20:33:31 herz-der-gamer sshd[22821]: Failed password for invalid user system from 158.69.112.95 port 42890 ssh2
...
2019-07-08 06:03:33
142.44.218.192 attackbots
Jul  7 18:35:14 vps691689 sshd[22881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.218.192
Jul  7 18:35:16 vps691689 sshd[22881]: Failed password for invalid user mel from 142.44.218.192 port 32954 ssh2
Jul  7 18:38:12 vps691689 sshd[22899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.218.192
...
2019-07-08 06:41:51

Recently Reported IPs

22.37.32.41 221.251.240.187 198.199.105.154 41.59.204.136
45.58.21.162 183.146.59.94 123.126.113.133 195.123.124.157
14.39.254.222 46.49.121.187 114.44.159.226 134.122.32.193
95.251.220.140 124.8.224.9 5.160.213.64 83.242.25.147
195.54.167.215 96.9.245.150 77.28.62.194 45.144.235.61