Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.145.23.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22065
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.145.23.22.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 22:08:44 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 22.23.145.149.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 149.145.23.22.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
111.53.11.200 attackspambots
07/06/2020-23:48:38.478575 111.53.11.200 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-07-07 18:33:39
60.167.181.61 attackbotsspam
2020-07-06T23:55:44.070759morrigan.ad5gb.com sshd[2802489]: Invalid user ebay from 60.167.181.61 port 39766
2020-07-06T23:55:46.114623morrigan.ad5gb.com sshd[2802489]: Failed password for invalid user ebay from 60.167.181.61 port 39766 ssh2
2020-07-07 18:29:02
114.67.74.50 attack
nginx/honey/a4a6f
2020-07-07 18:44:58
223.70.214.114 attackspam
Jul  7 05:36:51 nas sshd[1974]: Failed password for root from 223.70.214.114 port 7333 ssh2
Jul  7 05:48:38 nas sshd[2591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.70.214.114 
Jul  7 05:48:40 nas sshd[2591]: Failed password for invalid user julie from 223.70.214.114 port 10436 ssh2
...
2020-07-07 18:28:33
84.241.7.77 attackspambots
2020-07-07T17:00:20.956502hostname sshd[19567]: Failed password for root from 84.241.7.77 port 35232 ssh2
...
2020-07-07 18:56:34
171.232.172.32 attackspam
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-07-07 18:55:44
36.57.64.71 attack
Jul  7 08:48:25 srv01 postfix/smtpd\[18806\]: warning: unknown\[36.57.64.71\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 08:48:36 srv01 postfix/smtpd\[18806\]: warning: unknown\[36.57.64.71\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 08:48:52 srv01 postfix/smtpd\[18806\]: warning: unknown\[36.57.64.71\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 08:49:11 srv01 postfix/smtpd\[18806\]: warning: unknown\[36.57.64.71\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 08:49:23 srv01 postfix/smtpd\[18806\]: warning: unknown\[36.57.64.71\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-07 19:02:12
134.209.123.101 attack
134.209.123.101 - - \[07/Jul/2020:10:26:45 +0200\] "POST /wp-login.php HTTP/1.1" 200 9954 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
134.209.123.101 - - \[07/Jul/2020:10:26:51 +0200\] "POST /wp-login.php HTTP/1.1" 200 9789 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2020-07-07 18:44:05
122.51.41.109 attackspam
Jul  7 09:16:40 ns392434 sshd[3001]: Invalid user testserver from 122.51.41.109 port 37240
Jul  7 09:16:40 ns392434 sshd[3001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.41.109
Jul  7 09:16:40 ns392434 sshd[3001]: Invalid user testserver from 122.51.41.109 port 37240
Jul  7 09:16:42 ns392434 sshd[3001]: Failed password for invalid user testserver from 122.51.41.109 port 37240 ssh2
Jul  7 09:37:37 ns392434 sshd[3166]: Invalid user ts3user from 122.51.41.109 port 49072
Jul  7 09:37:37 ns392434 sshd[3166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.41.109
Jul  7 09:37:37 ns392434 sshd[3166]: Invalid user ts3user from 122.51.41.109 port 49072
Jul  7 09:37:39 ns392434 sshd[3166]: Failed password for invalid user ts3user from 122.51.41.109 port 49072 ssh2
Jul  7 09:41:57 ns392434 sshd[3308]: Invalid user gcl from 122.51.41.109 port 37510
2020-07-07 18:32:44
175.24.49.130 attackbotsspam
Jul  6 15:44:28 nbi-636 sshd[13937]: Invalid user adminixxxr from 175.24.49.130 port 48414
Jul  6 15:44:28 nbi-636 sshd[13937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.49.130 
Jul  6 15:44:30 nbi-636 sshd[13937]: Failed password for invalid user adminixxxr from 175.24.49.130 port 48414 ssh2
Jul  6 15:44:30 nbi-636 sshd[13937]: Received disconnect from 175.24.49.130 port 48414:11: Bye Bye [preauth]
Jul  6 15:44:30 nbi-636 sshd[13937]: Disconnected from invalid user adminixxxr 175.24.49.130 port 48414 [preauth]
Jul  6 15:50:06 nbi-636 sshd[15424]: Invalid user temp from 175.24.49.130 port 39280
Jul  6 15:50:06 nbi-636 sshd[15424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.49.130 
Jul  6 15:50:08 nbi-636 sshd[15424]: Failed password for invalid user temp from 175.24.49.130 port 39280 ssh2
Jul  6 15:50:11 nbi-636 sshd[15424]: Received disconnect from 175.24.49.130 por........
-------------------------------
2020-07-07 18:24:01
192.99.5.94 attackbotsspam
192.99.5.94 - - [07/Jul/2020:11:19:41 +0100] "POST /wp-login.php HTTP/1.1" 200 5881 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.5.94 - - [07/Jul/2020:11:21:52 +0100] "POST /wp-login.php HTTP/1.1" 200 5881 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.5.94 - - [07/Jul/2020:11:24:15 +0100] "POST /wp-login.php HTTP/1.1" 200 5874 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-07-07 18:26:58
51.91.212.79 attackbots
 TCP (SYN) 51.91.212.79:48544 -> port 3389, len 44
2020-07-07 18:46:08
121.229.2.190 attackspambots
Jul  7 09:24:34 ovpn sshd\[14674\]: Invalid user honey from 121.229.2.190
Jul  7 09:24:34 ovpn sshd\[14674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.2.190
Jul  7 09:24:37 ovpn sshd\[14674\]: Failed password for invalid user honey from 121.229.2.190 port 35920 ssh2
Jul  7 09:37:01 ovpn sshd\[17758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.2.190  user=root
Jul  7 09:37:03 ovpn sshd\[17758\]: Failed password for root from 121.229.2.190 port 57296 ssh2
2020-07-07 18:58:50
220.134.176.110 attack
 TCP (SYN) 220.134.176.110:62008 -> port 80, len 40
2020-07-07 18:25:58
178.128.86.188 attackbots
srv02 Mass scanning activity detected Target: 29947  ..
2020-07-07 18:47:17

Recently Reported IPs

73.51.163.54 163.7.219.55 231.92.12.206 225.62.105.142
186.66.134.115 244.140.217.223 236.99.234.61 152.37.120.64
155.13.193.177 155.145.150.17 162.74.102.19 14.229.89.116
193.219.168.137 172.61.17.5 245.74.56.7 101.145.33.81
227.175.106.201 73.92.10.195 161.230.104.13 92.43.22.198