Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.50.244.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49854
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.50.244.27.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121300 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 13 20:21:53 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 27.244.50.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 27.244.50.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.55.35.40 attackbotsspam
Jul 17 22:02:07 ip-172-31-1-72 sshd\[29668\]: Invalid user wang from 45.55.35.40
Jul 17 22:02:07 ip-172-31-1-72 sshd\[29668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.35.40
Jul 17 22:02:09 ip-172-31-1-72 sshd\[29668\]: Failed password for invalid user wang from 45.55.35.40 port 37562 ssh2
Jul 17 22:06:29 ip-172-31-1-72 sshd\[29750\]: Invalid user uniform from 45.55.35.40
Jul 17 22:06:29 ip-172-31-1-72 sshd\[29750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.35.40
2019-07-18 07:11:04
167.71.192.131 attack
Jul 17 19:24:12 server2 sshd\[27705\]: User root from 167.71.192.131 not allowed because not listed in AllowUsers
Jul 17 19:24:14 server2 sshd\[27707\]: Invalid user admin from 167.71.192.131
Jul 17 19:24:17 server2 sshd\[27709\]: Invalid user admin from 167.71.192.131
Jul 17 19:24:20 server2 sshd\[27711\]: Invalid user user from 167.71.192.131
Jul 17 19:24:30 server2 sshd\[27713\]: Invalid user ubnt from 167.71.192.131
Jul 17 19:24:33 server2 sshd\[27715\]: Invalid user admin from 167.71.192.131
2019-07-18 07:19:41
202.88.241.107 attackbots
Invalid user charpel from 202.88.241.107 port 35132
2019-07-18 06:52:32
125.141.139.23 attack
Jul 17 18:32:54 vps200512 sshd\[14984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.141.139.23  user=root
Jul 17 18:32:55 vps200512 sshd\[14984\]: Failed password for root from 125.141.139.23 port 57942 ssh2
Jul 17 18:38:47 vps200512 sshd\[15114\]: Invalid user odoo from 125.141.139.23
Jul 17 18:38:47 vps200512 sshd\[15114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.141.139.23
Jul 17 18:38:49 vps200512 sshd\[15114\]: Failed password for invalid user odoo from 125.141.139.23 port 56968 ssh2
2019-07-18 06:50:04
94.191.82.80 attackbots
Jul 17 08:36:56 foo sshd[16659]: Did not receive identification string from 94.191.82.80
Jul 17 08:38:49 foo sshd[16667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.82.80  user=r.r
Jul 17 08:38:52 foo sshd[16667]: Failed password for r.r from 94.191.82.80 port 44808 ssh2
Jul 17 08:38:52 foo sshd[16667]: Received disconnect from 94.191.82.80: 11: Bye Bye [preauth]
Jul 17 08:40:13 foo sshd[16706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.82.80  user=r.r
Jul 17 08:40:15 foo sshd[16706]: Failed password for r.r from 94.191.82.80 port 49548 ssh2
Jul 17 08:40:16 foo sshd[16706]: Received disconnect from 94.191.82.80: 11: Bye Bye [preauth]
Jul 17 08:41:35 foo sshd[16714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.82.80  user=r.r
Jul 17 08:41:37 foo sshd[16714]: Failed password for r.r from 94.191.82.80 port 54294 ssh2
Ju........
-------------------------------
2019-07-18 06:49:38
104.248.57.21 attackbotsspam
Jul 18 00:39:22 MainVPS sshd[10925]: Invalid user frappe from 104.248.57.21 port 55058
Jul 18 00:39:22 MainVPS sshd[10925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.57.21
Jul 18 00:39:22 MainVPS sshd[10925]: Invalid user frappe from 104.248.57.21 port 55058
Jul 18 00:39:24 MainVPS sshd[10925]: Failed password for invalid user frappe from 104.248.57.21 port 55058 ssh2
Jul 18 00:43:48 MainVPS sshd[11231]: Invalid user squirrelmail from 104.248.57.21 port 51752
...
2019-07-18 06:50:19
46.94.45.117 attackspam
Jul 18 00:41:19 icinga sshd[24961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.94.45.117
Jul 18 00:41:21 icinga sshd[24961]: Failed password for invalid user hadoop from 46.94.45.117 port 19072 ssh2
...
2019-07-18 07:00:09
121.163.199.103 attackspam
SPLUNK port scan detected:
Jul 17 12:24:23 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=121.163.199.103 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=64956 PROTO=TCP SPT=40015 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0
2019-07-18 07:24:38
77.243.210.156 attackbots
Jul 18 01:00:04 v22019058497090703 sshd[23160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.243.210.156
Jul 18 01:00:06 v22019058497090703 sshd[23160]: Failed password for invalid user user6 from 77.243.210.156 port 46816 ssh2
Jul 18 01:06:04 v22019058497090703 sshd[23542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.243.210.156
...
2019-07-18 07:13:44
151.66.53.222 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-18 07:06:48
119.29.198.228 attackbots
Jul 18 00:44:38 legacy sshd[21701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.198.228
Jul 18 00:44:40 legacy sshd[21701]: Failed password for invalid user dspace from 119.29.198.228 port 45964 ssh2
Jul 18 00:48:26 legacy sshd[21812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.198.228
...
2019-07-18 06:57:56
85.209.3.108 attack
Portscan or hack attempt detected by psad/fwsnort
2019-07-18 07:02:55
92.53.65.136 attack
Port scan on 3 port(s): 3681 3813 4075
2019-07-18 06:58:50
181.52.172.134 attackspam
2019-07-17T22:39:20.497169abusebot-6.cloudsearch.cf sshd\[8328\]: Invalid user mysql from 181.52.172.134 port 49172
2019-07-18 06:45:30
134.209.157.64 attackbots
$f2bV_matches
2019-07-18 06:49:15

Recently Reported IPs

100.41.65.215 213.11.195.22 172.57.141.209 114.198.49.231
195.138.79.118 103.165.40.146 177.128.208.230 234.155.132.178
238.73.206.223 172.31.181.58 163.251.84.67 13.59.95.36
147.219.12.131 194.99.138.80 216.130.111.60 4.253.225.105
178.7.103.44 148.38.140.132 85.3.211.106 36.211.231.23