Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.40.238.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38786
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.40.238.44.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:54:02 CST 2025
;; MSG SIZE  rcvd: 106
Host info
44.238.40.145.in-addr.arpa domain name pointer 44-238-40-145.dyn.fiber.qlnet.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
44.238.40.145.in-addr.arpa	name = 44-238-40-145.dyn.fiber.qlnet.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.148.154 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-10-13 23:15:47
192.241.139.236 attackspam
Oct 13 19:55:27 gw1 sshd[7723]: Failed password for root from 192.241.139.236 port 45856 ssh2
...
2020-10-13 23:10:54
61.177.172.142 attack
Oct 13 14:56:59 scw-6657dc sshd[6944]: Failed password for root from 61.177.172.142 port 28973 ssh2
Oct 13 14:56:59 scw-6657dc sshd[6944]: Failed password for root from 61.177.172.142 port 28973 ssh2
Oct 13 14:57:02 scw-6657dc sshd[6944]: Failed password for root from 61.177.172.142 port 28973 ssh2
...
2020-10-13 23:02:19
178.62.110.145 attack
178.62.110.145 - - [13/Oct/2020:16:56:36 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.62.110.145 - - [13/Oct/2020:16:56:37 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.62.110.145 - - [13/Oct/2020:16:56:38 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-10-13 23:31:28
213.33.216.246 attackspambots
SSH invalid-user multiple login attempts
2020-10-13 23:17:24
129.144.183.81 attack
Oct 13 15:26:14 marvibiene sshd[4782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.144.183.81 
Oct 13 15:26:16 marvibiene sshd[4782]: Failed password for invalid user admin from 129.144.183.81 port 10117 ssh2
2020-10-13 23:05:21
202.159.24.35 attack
2020-10-13T12:16:11.681919shield sshd\[30561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.159.24.35  user=root
2020-10-13T12:16:14.114224shield sshd\[30561\]: Failed password for root from 202.159.24.35 port 59935 ssh2
2020-10-13T12:20:16.231206shield sshd\[31293\]: Invalid user ruiz from 202.159.24.35 port 57696
2020-10-13T12:20:16.246645shield sshd\[31293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.159.24.35
2020-10-13T12:20:18.312434shield sshd\[31293\]: Failed password for invalid user ruiz from 202.159.24.35 port 57696 ssh2
2020-10-13 23:00:31
188.166.150.254 attackspambots
SSH Brute-Force attacks
2020-10-13 23:34:55
85.31.135.253 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-10-13 23:16:05
120.148.160.166 attackspam
failed root login
2020-10-13 23:11:51
101.231.166.39 attack
$f2bV_matches
2020-10-13 23:21:29
160.124.103.55 attack
Automatic report - Banned IP Access
2020-10-13 23:12:48
101.32.42.126 attackspam
2020-10-10 14:31:06 server sshd[17392]: Failed password for invalid user root from 101.32.42.126 port 41442 ssh2
2020-10-13 23:24:37
95.182.122.131 attackspambots
Oct 13 11:11:23 web8 sshd\[438\]: Invalid user 123 from 95.182.122.131
Oct 13 11:11:23 web8 sshd\[438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.182.122.131
Oct 13 11:11:25 web8 sshd\[438\]: Failed password for invalid user 123 from 95.182.122.131 port 51427 ssh2
Oct 13 11:15:12 web8 sshd\[2796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.182.122.131  user=root
Oct 13 11:15:14 web8 sshd\[2796\]: Failed password for root from 95.182.122.131 port 53274 ssh2
2020-10-13 23:17:40
45.240.88.35 attack
$f2bV_matches
2020-10-13 23:21:05

Recently Reported IPs

252.64.166.204 52.25.42.118 15.129.218.208 19.243.0.129
34.142.20.156 89.180.140.245 215.38.234.181 187.254.239.15
120.208.90.30 226.46.153.124 90.160.89.92 51.73.219.60
232.210.213.177 67.162.177.115 109.142.228.4 3.30.173.213
229.208.205.213 239.118.187.137 179.109.3.155 131.226.37.118