Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: OJSC Ufanet

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbotsspam
Jan 15 17:10:22 pi sshd[30514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.255.2.243 
Jan 15 17:10:24 pi sshd[30514]: Failed password for invalid user system from 145.255.2.243 port 61823 ssh2
2020-03-14 01:19:45
Comments on same subnet:
IP Type Details Datetime
145.255.27.194 attackspambots
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-25 06:06:55
145.255.21.69 attackspambots
Unauthorized connection attempt detected from IP address 145.255.21.69 to port 445 [T]
2020-08-29 22:43:03
145.255.28.2 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-08-22 13:08:36
145.255.28.2 attackspam
spam
2020-08-17 16:59:48
145.255.254.241 attackspambots
Unauthorized connection attempt detected from IP address 145.255.254.241 to port 23 [T]
2020-08-16 03:08:07
145.255.21.213 attackspam
honeypot forum registration (user=Philliprisee; email=intercreditl@yandex.ru)
2020-06-12 17:49:55
145.255.21.151 attackbots
Port probing on unauthorized port 445
2020-06-04 03:38:39
145.255.25.247 attackbots
" "
2020-04-30 07:08:28
145.255.28.2 attackbots
Brute force attack stopped by firewall
2020-04-05 10:17:05
145.255.2.212 attackbots
Unauthorized connection attempt detected from IP address 145.255.2.212 to port 23 [T]
2020-03-24 20:43:47
145.255.26.115 attackbotsspam
Honeypot attack, port: 81, PTR: 145.255.26.115.static.ufanet.ru.
2020-03-11 21:48:14
145.255.239.178 attackspam
[portscan] Port scan
2020-03-04 14:10:11
145.255.28.122 attackspambots
spam
2020-03-01 19:45:44
145.255.28.2 attackbots
spam
2020-01-24 16:17:58
145.255.28.2 attackspam
spam
2020-01-22 18:58:03
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.255.2.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49621
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.255.2.243.			IN	A

;; AUTHORITY SECTION:
.			275	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031300 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 14 01:19:40 CST 2020
;; MSG SIZE  rcvd: 117
Host info
243.2.255.145.in-addr.arpa domain name pointer 145.255.2.243.static.ufanet.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
243.2.255.145.in-addr.arpa	name = 145.255.2.243.static.ufanet.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
68.183.104.88 attack
2020-07-18T17:33:01.459484mail.csmailer.org sshd[23215]: Invalid user admin from 68.183.104.88 port 51776
2020-07-18T17:33:01.464275mail.csmailer.org sshd[23215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.104.88
2020-07-18T17:33:01.459484mail.csmailer.org sshd[23215]: Invalid user admin from 68.183.104.88 port 51776
2020-07-18T17:33:03.580926mail.csmailer.org sshd[23215]: Failed password for invalid user admin from 68.183.104.88 port 51776 ssh2
2020-07-18T17:34:35.186854mail.csmailer.org sshd[23355]: Invalid user mc from 68.183.104.88 port 48174
...
2020-07-19 01:42:11
106.13.173.137 attack
Invalid user ken from 106.13.173.137 port 47592
2020-07-19 01:18:00
167.114.115.33 attackbots
Invalid user yhf from 167.114.115.33 port 47642
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=33.ip-167-114-115.net
Invalid user yhf from 167.114.115.33 port 47642
Failed password for invalid user yhf from 167.114.115.33 port 47642 ssh2
Invalid user selim from 167.114.115.33 port 33694
2020-07-19 01:05:33
23.129.64.197 attackbotsspam
(mod_security) mod_security (id:218420) triggered by 23.129.64.197 (US/United States/-): 5 in the last 3600 secs
2020-07-19 01:26:42
101.32.1.249 attackspam
Jul 18 19:34:06 ift sshd\[28433\]: Invalid user ftpadm from 101.32.1.249Jul 18 19:34:08 ift sshd\[28433\]: Failed password for invalid user ftpadm from 101.32.1.249 port 44350 ssh2Jul 18 19:37:06 ift sshd\[29219\]: Invalid user laravel from 101.32.1.249Jul 18 19:37:08 ift sshd\[29219\]: Failed password for invalid user laravel from 101.32.1.249 port 35504 ssh2Jul 18 19:39:59 ift sshd\[29578\]: Failed password for invalid user admin from 101.32.1.249 port 54890 ssh2
...
2020-07-19 01:40:58
166.111.152.230 attackbots
Jul 18 12:33:57 scw-tender-jepsen sshd[11035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.111.152.230
Jul 18 12:33:59 scw-tender-jepsen sshd[11035]: Failed password for invalid user web from 166.111.152.230 port 37514 ssh2
2020-07-19 01:34:52
210.99.216.205 attackspam
SSH Brute-Forcing (server1)
2020-07-19 01:29:11
172.81.251.60 attackspam
Jul 18 18:53:56 PorscheCustomer sshd[32427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.251.60
Jul 18 18:53:58 PorscheCustomer sshd[32427]: Failed password for invalid user sylvain from 172.81.251.60 port 60752 ssh2
Jul 18 18:58:38 PorscheCustomer sshd[32545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.251.60
...
2020-07-19 01:05:01
170.210.121.66 attackspambots
*Port Scan* detected from 170.210.121.66 (AR/Argentina/Buenos Aires F.D./Buenos Aires/-). 4 hits in the last 35 seconds
2020-07-19 01:34:04
106.13.144.8 attackspambots
Invalid user mcftp from 106.13.144.8 port 56572
2020-07-19 01:18:16
138.204.78.249 attack
Jul 18 17:15:46 mout sshd[313]: Invalid user zhaoshaojing from 138.204.78.249 port 55478
2020-07-19 01:36:45
103.220.47.34 attackspam
Invalid user bd from 103.220.47.34 port 44156
2020-07-19 01:19:07
116.105.216.30 attackspambots
Invalid user admin from 116.105.216.30 port 34646
2020-07-19 01:13:31
111.229.109.26 attackbots
(sshd) Failed SSH login from 111.229.109.26 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 18 14:53:58 amsweb01 sshd[13763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.109.26  user=root
Jul 18 14:53:59 amsweb01 sshd[13766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.109.26  user=root
Jul 18 14:53:59 amsweb01 sshd[13763]: Failed password for root from 111.229.109.26 port 59520 ssh2
Jul 18 14:54:01 amsweb01 sshd[13766]: Failed password for root from 111.229.109.26 port 36686 ssh2
Jul 18 14:54:01 amsweb01 sshd[13771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.109.26  user=root
2020-07-19 01:16:09
139.59.56.23 attack
(sshd) Failed SSH login from 139.59.56.23 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 18 17:14:30 amsweb01 sshd[15868]: Invalid user support from 139.59.56.23 port 45328
Jul 18 17:14:32 amsweb01 sshd[15868]: Failed password for invalid user support from 139.59.56.23 port 45328 ssh2
Jul 18 17:27:35 amsweb01 sshd[19784]: Invalid user user7 from 139.59.56.23 port 44880
Jul 18 17:27:37 amsweb01 sshd[19784]: Failed password for invalid user user7 from 139.59.56.23 port 44880 ssh2
Jul 18 17:31:43 amsweb01 sshd[20960]: Invalid user mietek from 139.59.56.23 port 50004
2020-07-19 01:36:09

Recently Reported IPs

43.242.242.42 176.164.154.5 112.133.251.47 78.184.233.141
181.113.58.26 95.152.53.243 36.72.123.109 103.30.17.33
150.222.242.90 186.212.117.61 150.222.241.183 218.156.216.84
167.114.92.57 118.25.88.204 103.116.105.118 195.20.28.192
179.104.235.117 110.184.199.244 192.249.115.24 159.138.22.170