Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hayward

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.136.27.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47419
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.136.27.145.			IN	A

;; AUTHORITY SECTION:
.			417	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023022800 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 28 18:59:04 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 145.27.136.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.27.136.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.206.225.82 attack
Unauthorized connection attempt detected from IP address 112.206.225.82 to port 2220 [J]
2020-01-08 14:48:44
77.81.230.120 attack
Unauthorized connection attempt detected from IP address 77.81.230.120 to port 2220 [J]
2020-01-08 14:59:56
104.236.246.16 attackspambots
2020-01-08T05:31:04.434152+00:00 suse sshd[14184]: Invalid user test1 from 104.236.246.16 port 47502
2020-01-08T05:32:45.972308+00:00 suse sshd[14201]: Invalid user backuppc from 104.236.246.16 port 39284
2020-01-08T05:34:34.665768+00:00 suse sshd[14231]: User root from 104.236.246.16 not allowed because not listed in AllowUsers
...
2020-01-08 14:17:30
222.186.180.6 attackbotsspam
Jan  8 07:17:03 root sshd[8291]: Failed password for root from 222.186.180.6 port 49450 ssh2
Jan  8 07:17:07 root sshd[8291]: Failed password for root from 222.186.180.6 port 49450 ssh2
Jan  8 07:17:11 root sshd[8291]: Failed password for root from 222.186.180.6 port 49450 ssh2
Jan  8 07:17:16 root sshd[8291]: Failed password for root from 222.186.180.6 port 49450 ssh2
...
2020-01-08 15:04:31
123.148.146.163 attackbots
xmlrpc attack
2020-01-08 14:28:54
180.245.69.108 attackspam
Jan  6 20:18:49 pl3server sshd[23282]: Invalid user fsg from 180.245.69.108
Jan  6 20:18:49 pl3server sshd[23282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.245.69.108
Jan  6 20:18:51 pl3server sshd[23282]: Failed password for invalid user fsg from 180.245.69.108 port 42990 ssh2
Jan  6 20:18:51 pl3server sshd[23282]: Received disconnect from 180.245.69.108: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=180.245.69.108
2020-01-08 15:01:06
178.128.201.239 attack
unauthorized connection attempt
2020-01-08 14:23:04
5.146.193.132 attack
5.146.193.132 - - [08/Jan/2020:05:54:09 +0100] "GET /.well-known/assetlinks.json HTTP/2.0" 404 106 "-" "{version:6.1950.0,platform:server_android,osversion:9}"
2020-01-08 15:03:06
112.85.42.188 attackspambots
01/08/2020-01:15:11.148075 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-01-08 14:16:15
80.82.77.86 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 32771 proto: UDP cat: Misc Attack
2020-01-08 15:06:49
212.30.52.243 attackbots
Jan  8 06:46:43 plex sshd[22676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.30.52.243  user=root
Jan  8 06:46:46 plex sshd[22676]: Failed password for root from 212.30.52.243 port 50870 ssh2
2020-01-08 14:11:31
106.12.99.173 attackbots
leo_www
2020-01-08 15:05:55
211.72.212.241 attack
1578459266 - 01/08/2020 05:54:26 Host: 211.72.212.241/211.72.212.241 Port: 445 TCP Blocked
2020-01-08 14:54:59
103.219.112.98 attackspambots
Jan  8 05:55:05 MK-Soft-Root2 sshd[7076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.112.98 
Jan  8 05:55:08 MK-Soft-Root2 sshd[7076]: Failed password for invalid user sth from 103.219.112.98 port 36418 ssh2
...
2020-01-08 14:23:33
54.36.238.211 attackspam
\[2020-01-07 23:54:06\] NOTICE\[2839\] chan_sip.c: Registration from '"808" \' failed for '54.36.238.211:5274' - Wrong password
\[2020-01-07 23:54:06\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-01-07T23:54:06.568-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="808",SessionID="0x7f0fb4ca4128",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/54.36.238.211/5274",Challenge="1fce3b34",ReceivedChallenge="1fce3b34",ReceivedHash="c4acded6c1739a5907035fafbc8beb32"
\[2020-01-07 23:54:06\] NOTICE\[2839\] chan_sip.c: Registration from '"808" \' failed for '54.36.238.211:5274' - Wrong password
\[2020-01-07 23:54:06\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-01-07T23:54:06.695-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="808",SessionID="0x7f0fb40977c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/54.3
2020-01-08 15:03:26

Recently Reported IPs

159.159.206.226 130.233.119.161 128.241.78.33 129.239.217.160
104.55.89.71 104.110.103.37 101.44.245.121 104.131.72.58
104.131.72.188 83.238.116.10 252.83.203.250 88.43.34.17
79.21.210.126 17.88.177.58 70.248.29.124 209.40.44.37
6.224.192.112 230.161.27.51 168.3.18.224 104.227.77.51