Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Chile

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.155.136.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35198
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.155.136.214.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 23:27:04 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 214.136.155.146.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.136.155.146.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.155.45.130 attack
Aug 20 20:22:56 ns3033917 sshd[15984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.45.130  user=root
Aug 20 20:22:58 ns3033917 sshd[15984]: Failed password for root from 139.155.45.130 port 48314 ssh2
Aug 20 20:27:18 ns3033917 sshd[16012]: Invalid user admin from 139.155.45.130 port 34604
...
2020-08-21 06:28:06
194.180.224.130 attack
Aug 20 22:11:23 jumpserver sshd[1186]: Invalid user admin from 194.180.224.130 port 42936
Aug 20 22:11:24 jumpserver sshd[1188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.224.130  user=root
Aug 20 22:11:27 jumpserver sshd[1188]: Failed password for root from 194.180.224.130 port 42930 ssh2
...
2020-08-21 06:13:47
59.127.182.148 attackbotsspam
Unauthorised access (Aug 20) SRC=59.127.182.148 LEN=40 TTL=44 ID=5070 TCP DPT=23 WINDOW=50490 SYN 
Unauthorised access (Aug 20) SRC=59.127.182.148 LEN=40 TTL=44 ID=9536 TCP DPT=23 WINDOW=4456 SYN
2020-08-21 06:02:12
165.227.225.195 attackspambots
Aug 20 23:48:41 eventyay sshd[8352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.225.195
Aug 20 23:48:43 eventyay sshd[8352]: Failed password for invalid user oper from 165.227.225.195 port 53284 ssh2
Aug 20 23:52:43 eventyay sshd[8468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.225.195
...
2020-08-21 06:03:09
141.98.10.198 attackbots
Aug 20 17:37:39 plusreed sshd[25259]: Invalid user Administrator from 141.98.10.198
...
2020-08-21 06:09:00
128.116.152.1 attack
Firewall Dropped Connection
2020-08-21 06:01:45
181.59.252.136 attackspambots
2020-08-20T23:44:34.599150lavrinenko.info sshd[30749]: Invalid user demouser from 181.59.252.136 port 33112
2020-08-20T23:44:34.609159lavrinenko.info sshd[30749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.59.252.136
2020-08-20T23:44:34.599150lavrinenko.info sshd[30749]: Invalid user demouser from 181.59.252.136 port 33112
2020-08-20T23:44:36.284417lavrinenko.info sshd[30749]: Failed password for invalid user demouser from 181.59.252.136 port 33112 ssh2
2020-08-20T23:48:51.356217lavrinenko.info sshd[30956]: Invalid user jse from 181.59.252.136 port 41350
...
2020-08-21 06:12:06
170.130.165.145 attackspam
email spam
2020-08-21 06:27:18
54.37.235.183 attackspam
Aug 20 15:03:18 dignus sshd[10893]: Invalid user admin from 54.37.235.183 port 34242
Aug 20 15:03:18 dignus sshd[10893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.235.183
Aug 20 15:03:20 dignus sshd[10893]: Failed password for invalid user admin from 54.37.235.183 port 34242 ssh2
Aug 20 15:07:27 dignus sshd[11427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.235.183  user=root
Aug 20 15:07:29 dignus sshd[11427]: Failed password for root from 54.37.235.183 port 42720 ssh2
...
2020-08-21 06:13:21
147.139.168.106 attack
Invalid user teamspeak from 147.139.168.106 port 39603
2020-08-21 06:06:23
62.210.206.78 attackspambots
Invalid user wifi from 62.210.206.78 port 59392
2020-08-21 06:17:59
211.162.59.108 attackbotsspam
Invalid user testing from 211.162.59.108 port 57862
2020-08-21 06:13:33
125.17.108.87 attack
Aug 20 20:51:25 scw-focused-cartwright sshd[24315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.17.108.87
Aug 20 20:51:27 scw-focused-cartwright sshd[24315]: Failed password for invalid user testuser from 125.17.108.87 port 52552 ssh2
2020-08-21 06:24:46
103.130.214.44 attackspambots
Aug 20 23:27:59 server sshd[10456]: Failed password for root from 103.130.214.44 port 34866 ssh2
Aug 20 23:29:03 server sshd[11926]: Failed password for invalid user boost from 103.130.214.44 port 44350 ssh2
Aug 20 23:30:08 server sshd[13425]: Failed password for invalid user kelvin from 103.130.214.44 port 53834 ssh2
2020-08-21 06:12:25
47.190.132.213 attack
Aug 20 23:26:38 buvik sshd[4019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.190.132.213
Aug 20 23:26:40 buvik sshd[4019]: Failed password for invalid user ast from 47.190.132.213 port 59238 ssh2
Aug 20 23:30:04 buvik sshd[4581]: Invalid user yash from 47.190.132.213
...
2020-08-21 05:54:05

Recently Reported IPs

134.16.246.150 27.48.21.171 5.104.207.156 30.77.18.39
194.10.199.20 26.220.30.134 108.212.110.52 41.23.41.249
22.189.91.146 68.193.251.193 138.85.158.154 92.100.61.178
121.177.244.124 103.24.174.64 99.112.39.215 57.118.111.36
204.221.26.223 4.157.208.221 245.15.18.35 121.97.56.193