Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.145.202.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41283
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.145.202.34.			IN	A

;; AUTHORITY SECTION:
.			249	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122500 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 25 23:45:43 CST 2021
;; MSG SIZE  rcvd: 107
Host info
b';; connection timed out; no servers could be reached
'
Nslookup info:
server can't find 148.145.202.34.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
172.89.2.42 attackspambots
Honeypot attack, port: 445, PTR: cpe-172-89-2-42.socal.res.rr.com.
2020-06-04 06:38:51
150.109.182.55 attack
Honeypot attack, port: 2000, PTR: PTR record not found
2020-06-04 06:58:31
139.167.179.252 attackbots
Attempts against non-existent wp-login
2020-06-04 07:03:30
194.78.138.139 attack
2020-06-04T01:04:44.507657+02:00  sshd[28997]: Failed password for root from 194.78.138.139 port 47845 ssh2
2020-06-04 07:07:27
62.234.78.62 attackspambots
SSH Brute Force
2020-06-04 06:41:15
184.164.165.84 attackbots
Honeypot attack, port: 5555, PTR: d-184-164-165-84.fl.cpe.atlanticbb.net.
2020-06-04 07:07:00
180.153.65.18 attack
Jun  3 23:00:09 server sshd[25881]: Failed password for root from 180.153.65.18 port 54784 ssh2
Jun  3 23:03:39 server sshd[26083]: Failed password for root from 180.153.65.18 port 52888 ssh2
...
2020-06-04 06:45:33
115.76.175.188 attackspambots
Jun  3 21:13:55 l02a sshd[6821]: Invalid user pi from 115.76.175.188
Jun  3 21:13:55 l02a sshd[6819]: Invalid user pi from 115.76.175.188
2020-06-04 06:40:45
106.12.215.118 attack
Jun  4 01:58:32 gw1 sshd[5008]: Failed password for root from 106.12.215.118 port 39508 ssh2
...
2020-06-04 06:39:19
114.32.245.156 attack
Honeypot attack, port: 81, PTR: 114-32-245-156.HINET-IP.hinet.net.
2020-06-04 07:03:59
106.13.197.159 attackspam
2020-06-04T00:22:46.680087vps751288.ovh.net sshd\[3966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.197.159  user=root
2020-06-04T00:22:49.105385vps751288.ovh.net sshd\[3966\]: Failed password for root from 106.13.197.159 port 60522 ssh2
2020-06-04T00:25:53.770727vps751288.ovh.net sshd\[3990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.197.159  user=root
2020-06-04T00:25:55.533651vps751288.ovh.net sshd\[3990\]: Failed password for root from 106.13.197.159 port 50296 ssh2
2020-06-04T00:29:05.580225vps751288.ovh.net sshd\[4043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.197.159  user=root
2020-06-04 06:53:22
188.59.137.188 attackspambots
Automatic report - Port Scan Attack
2020-06-04 06:32:15
206.253.167.10 attackbotsspam
238. On Jun 3 2020 experienced a Brute Force SSH login attempt -> 100 unique times by 206.253.167.10.
2020-06-04 06:41:57
37.49.226.126 attackbotsspam
ZTE Router Exploit Scanner
2020-06-04 06:51:36
119.44.217.242 attack
Automatic report - Banned IP Access
2020-06-04 06:47:22

Recently Reported IPs

173.7.134.48 119.17.172.34 67.32.35.59 141.133.204.8
229.59.72.1 223.39.152.18 42.99.82.188 155.69.31.155
202.68.213.213 58.32.67.164 94.59.222.120 117.151.166.51
254.79.45.186 128.21.187.194 230.188.183.10 32.136.142.75
207.250.72.131 237.213.48.105 41.50.207.29 150.73.22.4