Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.92.253.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19764
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.92.253.239.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 14:39:55 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 239.253.92.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.253.92.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.135.161.7 attackbotsspam
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-08-24 22:40:18
111.74.11.85 attack
$f2bV_matches
2020-08-24 22:53:48
78.195.178.119 attack
Aug 24 15:21:20 prox sshd[30265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.195.178.119
2020-08-24 22:44:48
68.168.213.251 attackbots
2020-08-24T14:38:18.306269abusebot.cloudsearch.cf sshd[16119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.213.251  user=root
2020-08-24T14:38:20.252946abusebot.cloudsearch.cf sshd[16119]: Failed password for root from 68.168.213.251 port 33932 ssh2
2020-08-24T14:38:20.866336abusebot.cloudsearch.cf sshd[16121]: Invalid user admin from 68.168.213.251 port 37202
2020-08-24T14:38:20.871017abusebot.cloudsearch.cf sshd[16121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.213.251
2020-08-24T14:38:20.866336abusebot.cloudsearch.cf sshd[16121]: Invalid user admin from 68.168.213.251 port 37202
2020-08-24T14:38:22.757611abusebot.cloudsearch.cf sshd[16121]: Failed password for invalid user admin from 68.168.213.251 port 37202 ssh2
2020-08-24T14:38:23.401771abusebot.cloudsearch.cf sshd[16123]: Invalid user admin from 68.168.213.251 port 40562
...
2020-08-24 22:47:45
45.129.33.142 attack
[portscan] Port scan
2020-08-24 22:37:01
39.105.192.221 attack
Aug 24 13:51:07  sshd\[5752\]: User root from 39.105.192.221 not allowed because not listed in AllowUsersAug 24 13:51:09  sshd\[5752\]: Failed password for invalid user root from 39.105.192.221 port 56630 ssh2
...
2020-08-24 22:24:19
77.247.181.165 attackspam
Aug 24 15:33:25 prod4 sshd\[16054\]: Failed password for root from 77.247.181.165 port 27930 ssh2
Aug 24 15:33:28 prod4 sshd\[16054\]: Failed password for root from 77.247.181.165 port 27930 ssh2
Aug 24 15:33:30 prod4 sshd\[16054\]: Failed password for root from 77.247.181.165 port 27930 ssh2
...
2020-08-24 22:42:54
193.218.118.140 attackbots
prod11
...
2020-08-24 22:37:19
120.31.71.238 attackbotsspam
Aug 24 16:20:52 nextcloud sshd\[8015\]: Invalid user ftp from 120.31.71.238
Aug 24 16:20:52 nextcloud sshd\[8015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.31.71.238
Aug 24 16:20:54 nextcloud sshd\[8015\]: Failed password for invalid user ftp from 120.31.71.238 port 59698 ssh2
2020-08-24 22:26:01
81.68.141.71 attackbotsspam
Aug 24 14:43:29 PorscheCustomer sshd[25949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.141.71
Aug 24 14:43:30 PorscheCustomer sshd[25949]: Failed password for invalid user dbuser from 81.68.141.71 port 53534 ssh2
Aug 24 14:46:27 PorscheCustomer sshd[26033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.141.71
...
2020-08-24 22:42:21
185.220.101.213 attackspambots
detected by Fail2Ban
2020-08-24 22:22:13
168.62.174.233 attack
Aug 24 14:56:31 hell sshd[15248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.62.174.233
Aug 24 14:56:33 hell sshd[15248]: Failed password for invalid user samir from 168.62.174.233 port 43998 ssh2
...
2020-08-24 22:31:58
107.189.10.93 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-24 22:23:10
116.97.47.122 attack
[N10.H1.VM1] Port Scanner Detected Blocked by UFW
2020-08-24 22:21:39
221.130.59.248 attackspam
2020-08-24T17:06:47.015921lavrinenko.info sshd[31961]: Invalid user intekhab from 221.130.59.248 port 2197
2020-08-24T17:06:47.022124lavrinenko.info sshd[31961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.130.59.248
2020-08-24T17:06:47.015921lavrinenko.info sshd[31961]: Invalid user intekhab from 221.130.59.248 port 2197
2020-08-24T17:06:49.034257lavrinenko.info sshd[31961]: Failed password for invalid user intekhab from 221.130.59.248 port 2197 ssh2
2020-08-24T17:11:06.632918lavrinenko.info sshd[32048]: Invalid user zfm from 221.130.59.248 port 2198
...
2020-08-24 22:29:21

Recently Reported IPs

42.133.211.58 9.149.60.186 21.208.73.65 119.175.253.102
162.131.243.120 240.63.107.243 231.118.138.252 161.150.211.170
125.232.123.9 128.215.205.68 62.248.40.113 159.200.33.245
74.150.75.224 232.156.238.196 115.225.155.148 124.57.147.99
245.254.226.73 58.188.186.165 232.194.192.23 95.195.127.201