Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: OJSC Ufanet

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbots
Unauthorized connection attempt detected from IP address 145.255.5.53 to port 8080 [T]
2020-01-20 07:07:47
Comments on same subnet:
IP Type Details Datetime
145.255.5.101 attack
Honeypot attack, port: 445, PTR: 145.255.5.101.static.ufanet.ru.
2020-09-18 00:51:34
145.255.5.101 attackspambots
Honeypot attack, port: 445, PTR: 145.255.5.101.static.ufanet.ru.
2020-09-17 16:53:00
145.255.5.101 attack
Honeypot attack, port: 445, PTR: 145.255.5.101.static.ufanet.ru.
2020-09-17 07:58:34
145.255.5.55 attackspam
Unauthorized connection attempt detected from IP address 145.255.5.55 to port 81 [T]
2020-05-09 02:19:43
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.255.5.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64536
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.255.5.53.			IN	A

;; AUTHORITY SECTION:
.			189	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011901 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 20 07:07:44 CST 2020
;; MSG SIZE  rcvd: 116
Host info
53.5.255.145.in-addr.arpa domain name pointer 145.255.5.53.static.ufanet.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.5.255.145.in-addr.arpa	name = 145.255.5.53.static.ufanet.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
140.143.2.228 attack
Automatic report - Banned IP Access
2020-02-09 03:24:27
145.239.91.88 attackbotsspam
Feb  8 14:24:41 work-partkepr sshd\[19678\]: Invalid user wbg from 145.239.91.88 port 43566
Feb  8 14:24:41 work-partkepr sshd\[19678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.91.88
...
2020-02-09 03:42:45
106.13.77.243 attackbotsspam
Feb  8 18:16:09 vmd26974 sshd[13514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.77.243
Feb  8 18:16:12 vmd26974 sshd[13514]: Failed password for invalid user xp from 106.13.77.243 port 43824 ssh2
...
2020-02-09 03:27:39
82.194.21.128 attack
Automatic report - Windows Brute-Force Attack
2020-02-09 03:41:47
182.209.71.94 attack
Feb  8 17:53:08 ns382633 sshd\[5425\]: Invalid user cwn from 182.209.71.94 port 54812
Feb  8 17:53:08 ns382633 sshd\[5425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.209.71.94
Feb  8 17:53:10 ns382633 sshd\[5425\]: Failed password for invalid user cwn from 182.209.71.94 port 54812 ssh2
Feb  8 17:57:29 ns382633 sshd\[6277\]: Invalid user aey from 182.209.71.94 port 60826
Feb  8 17:57:29 ns382633 sshd\[6277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.209.71.94
2020-02-09 03:33:46
89.163.225.107 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 86 - port: 3702 proto: UDP cat: Misc Attack
2020-02-09 03:34:27
137.59.162.170 attackspam
Feb  8 19:14:16 lnxded64 sshd[10578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.59.162.170
2020-02-09 03:07:01
222.186.180.130 attackspambots
Feb  9 01:04:51 areeb-Workstation sshd[30275]: Failed password for root from 222.186.180.130 port 44370 ssh2
Feb  9 01:04:54 areeb-Workstation sshd[30275]: Failed password for root from 222.186.180.130 port 44370 ssh2
...
2020-02-09 03:44:07
66.240.205.34 attack
Feb  8 18:48:58 debian-2gb-nbg1-2 kernel: \[3443377.611866\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=66.240.205.34 DST=195.201.40.59 LEN=44 TOS=0x10 PREC=0x00 TTL=110 ID=6886 PROTO=TCP SPT=24858 DPT=1604 WINDOW=28239 RES=0x00 SYN URGP=0
2020-02-09 03:14:53
58.39.90.71 attackspambots
Feb  4 18:48:13 lamijardin sshd[7853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.39.90.71  user=r.r
Feb  4 18:48:15 lamijardin sshd[7853]: Failed password for r.r from 58.39.90.71 port 38586 ssh2
Feb  4 18:48:15 lamijardin sshd[7853]: Received disconnect from 58.39.90.71 port 38586:11: Bye Bye [preauth]
Feb  4 18:48:15 lamijardin sshd[7853]: Disconnected from 58.39.90.71 port 38586 [preauth]
Feb  4 18:57:25 lamijardin sshd[7869]: Invalid user pano from 58.39.90.71
Feb  4 18:57:25 lamijardin sshd[7869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.39.90.71
Feb  4 18:57:28 lamijardin sshd[7869]: Failed password for invalid user pano from 58.39.90.71 port 55280 ssh2
Feb  4 18:57:28 lamijardin sshd[7869]: fatal: ssh_dispatch_run_fatal: Connection from 58.39.90.71 port 55280: message authentication code incorrect [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip
2020-02-09 03:34:48
113.172.113.240 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 08-02-2020 14:25:16.
2020-02-09 03:11:29
193.188.22.188 attackspambots
SSH Brute Force
2020-02-09 03:44:29
83.146.113.214 attackbotsspam
Automatic report - Port Scan Attack
2020-02-09 03:41:27
218.92.0.168 attackbotsspam
Feb  8 20:25:26 SilenceServices sshd[28456]: Failed password for root from 218.92.0.168 port 51578 ssh2
Feb  8 20:25:36 SilenceServices sshd[28456]: Failed password for root from 218.92.0.168 port 51578 ssh2
Feb  8 20:25:39 SilenceServices sshd[28456]: Failed password for root from 218.92.0.168 port 51578 ssh2
Feb  8 20:25:39 SilenceServices sshd[28456]: error: maximum authentication attempts exceeded for root from 218.92.0.168 port 51578 ssh2 [preauth]
2020-02-09 03:32:23
185.56.153.229 attackbots
Feb  8 17:30:59 h1745522 sshd[14455]: Invalid user eda from 185.56.153.229 port 55422
Feb  8 17:30:59 h1745522 sshd[14455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.56.153.229
Feb  8 17:30:59 h1745522 sshd[14455]: Invalid user eda from 185.56.153.229 port 55422
Feb  8 17:31:01 h1745522 sshd[14455]: Failed password for invalid user eda from 185.56.153.229 port 55422 ssh2
Feb  8 17:33:08 h1745522 sshd[14494]: Invalid user bod from 185.56.153.229 port 41366
Feb  8 17:33:08 h1745522 sshd[14494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.56.153.229
Feb  8 17:33:08 h1745522 sshd[14494]: Invalid user bod from 185.56.153.229 port 41366
Feb  8 17:33:10 h1745522 sshd[14494]: Failed password for invalid user bod from 185.56.153.229 port 41366 ssh2
Feb  8 17:35:22 h1745522 sshd[14555]: Invalid user ehb from 185.56.153.229 port 55548
...
2020-02-09 03:45:43

Recently Reported IPs

58.187.209.175 49.115.196.30 15.245.208.122 49.76.189.192
42.119.170.75 42.118.164.139 42.118.85.123 42.112.54.99
36.108.129.185 14.155.223.144 1.69.74.219 211.171.212.160
193.112.95.222 183.193.234.142 183.89.79.68 183.80.89.87
183.80.45.144 182.222.195.140 180.218.96.254 139.155.46.252