Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
145.255.8.173 attackspambots
Unauthorized connection attempt from IP address 145.255.8.173 on Port 445(SMB)
2020-08-23 07:20:28
145.255.8.111 attackspambots
Unauthorized connection attempt detected from IP address 145.255.8.111 to port 445
2019-12-28 21:28:28
145.255.8.67 attackspam
3389BruteforceFW21
2019-06-30 12:58:20
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.255.8.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36143
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.255.8.53.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:44:46 CST 2022
;; MSG SIZE  rcvd: 105
Host info
53.8.255.145.in-addr.arpa domain name pointer 145.255.8.53.dynamic.ufanet.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.8.255.145.in-addr.arpa	name = 145.255.8.53.dynamic.ufanet.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
213.198.136.144 attack
Automatic report - Port Scan Attack
2019-09-21 01:48:43
132.232.47.41 attack
Sep 20 15:50:38 icinga sshd[30375]: Failed password for root from 132.232.47.41 port 38578 ssh2
...
2019-09-21 01:37:37
185.153.196.233 attack
09/20/2019-09:45:15.069581 185.153.196.233 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-21 01:18:38
45.6.72.17 attackspambots
$f2bV_matches_ltvn
2019-09-21 01:21:32
170.80.224.240 attackbots
Sep 20 11:11:57 db sshd[2048]: error: maximum authentication attempts exceeded for invalid user admin from 170.80.224.240 port 59117 ssh2 [preauth]
...
2019-09-21 01:49:11
51.68.188.67 attackspambots
Sep 20 18:10:22 vps647732 sshd[4408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.188.67
Sep 20 18:10:24 vps647732 sshd[4408]: Failed password for invalid user enomoto from 51.68.188.67 port 45628 ssh2
...
2019-09-21 01:41:58
27.254.137.144 attack
Fail2Ban - SSH Bruteforce Attempt
2019-09-21 01:40:22
200.58.219.218 attackbotsspam
$f2bV_matches
2019-09-21 01:33:20
210.17.219.193 attackspam
$f2bV_matches
2019-09-21 01:23:47
185.234.218.69 attackspambots
SSH-bruteforce attempts
2019-09-21 01:40:39
150.165.98.39 attack
Sep 20 12:37:52 ns3110291 sshd\[28875\]: Invalid user emp from 150.165.98.39
Sep 20 12:37:52 ns3110291 sshd\[28875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.165.98.39 
Sep 20 12:37:54 ns3110291 sshd\[28875\]: Failed password for invalid user emp from 150.165.98.39 port 20410 ssh2
Sep 20 12:42:34 ns3110291 sshd\[29087\]: Invalid user youtube from 150.165.98.39
Sep 20 12:42:34 ns3110291 sshd\[29087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.165.98.39 
...
2019-09-21 01:35:43
51.154.169.129 attack
Sep 20 06:16:34 ny01 sshd[2639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.154.169.129
Sep 20 06:16:36 ny01 sshd[2639]: Failed password for invalid user minecraft from 51.154.169.129 port 51488 ssh2
Sep 20 06:21:00 ny01 sshd[3454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.154.169.129
2019-09-21 01:32:57
188.166.117.213 attackbots
k+ssh-bruteforce
2019-09-21 01:18:16
94.196.165.9 attack
default	01:55:29.157089 -0700	trustd	asynchronously fetching CRL (http://crl.apple.com/root.crl) for client (amfid[101])/hacking 123/0eaf.cardinalcommerce.com user is i.e. Mac links default	01:55:29.891869 -0700	symptomsd	0x7fbd3cd234b0 event: kNotificationNewConnectivityEpochWiFi, noi: NOI: v:0 type:Wifi, isAny:yes, isBuiltin:no, loi:-1, flags:1, fastpath, current elig: 0, new elig: 1
illegal net/also 101 links to BBC - tampered build/construction integrity questionable/epoch new one trying disguise with name associated with the other half works - physical networks hidden/during the build - all sorted by end of the season/mostly wandering opportunists -known locals cardinal commerce chosen for religious take on attack/any green blue font in your search engine/you have been hacked by these 123
2019-09-21 01:34:41
200.107.154.47 attackbots
Sep 20 15:14:41 server sshd\[3685\]: Invalid user test from 200.107.154.47 port 63035
Sep 20 15:14:41 server sshd\[3685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.107.154.47
Sep 20 15:14:43 server sshd\[3685\]: Failed password for invalid user test from 200.107.154.47 port 63035 ssh2
Sep 20 15:19:49 server sshd\[30495\]: Invalid user testuser from 200.107.154.47 port 27092
Sep 20 15:19:49 server sshd\[30495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.107.154.47
2019-09-21 01:24:41

Recently Reported IPs

145.255.173.54 145.255.202.115 145.255.3.205 145.255.168.144
145.82.56.25 145.255.85.205 145.255.3.138 145.76.249.147
145.94.45.189 146.0.63.79 146.0.16.147 146.120.111.96
146.120.111.176 145.82.45.15 146.120.184.140 146.115.16.202
146.120.249.77 146.120.249.80 146.120.184.154 146.164.7.170