Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.18.56.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57519
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.18.56.145.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100602 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 06:53:41 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 145.56.18.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.56.18.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
2.32.82.50 attackbotsspam
2020-07-05T19:50:41.203786server.espacesoutien.com sshd[18068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.32.82.50  user=root
2020-07-05T19:50:43.144187server.espacesoutien.com sshd[18068]: Failed password for root from 2.32.82.50 port 57980 ssh2
2020-07-05T19:57:09.962778server.espacesoutien.com sshd[18686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.32.82.50  user=root
2020-07-05T19:57:11.834415server.espacesoutien.com sshd[18686]: Failed password for root from 2.32.82.50 port 53590 ssh2
...
2020-07-06 05:56:53
51.15.190.82 attackspam
Jul  5 18:31:34 game-panel sshd[19856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.190.82
Jul  5 18:31:36 game-panel sshd[19856]: Failed password for invalid user prueba from 51.15.190.82 port 57290 ssh2
Jul  5 18:33:53 game-panel sshd[20028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.190.82
2020-07-06 06:00:56
111.231.119.141 attackbots
Jul  5 22:53:30 gestao sshd[13180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.119.141 
Jul  5 22:53:32 gestao sshd[13180]: Failed password for invalid user cloud from 111.231.119.141 port 43066 ssh2
Jul  5 23:01:00 gestao sshd[13354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.119.141 
...
2020-07-06 06:02:16
124.156.55.181 attack
[Mon Jun 29 01:10:06 2020] - DDoS Attack From IP: 124.156.55.181 Port: 51786
2020-07-06 06:01:45
98.33.136.12 attack
Jul  5 21:33:49 server2 sshd\[28213\]: Invalid user admin from 98.33.136.12
Jul  5 21:33:50 server2 sshd\[28219\]: User root from 98.33.136.12 not allowed because not listed in AllowUsers
Jul  5 21:33:52 server2 sshd\[28221\]: Invalid user admin from 98.33.136.12
Jul  5 21:33:53 server2 sshd\[28223\]: Invalid user admin from 98.33.136.12
Jul  5 21:33:55 server2 sshd\[28225\]: Invalid user admin from 98.33.136.12
Jul  5 21:33:56 server2 sshd\[28227\]: User apache from 98.33.136.12 not allowed because not listed in AllowUsers
2020-07-06 05:59:39
61.177.172.41 attackspambots
Jul  5 10:48:43 vm1 sshd[12399]: Failed password for root from 61.177.172.41 port 55887 ssh2
Jul  5 23:48:07 vm1 sshd[1713]: Failed password for root from 61.177.172.41 port 21502 ssh2
...
2020-07-06 06:11:45
80.82.65.253 attack
SmallBizIT.US 9 packets to tcp(31017,31103,31104,31121,31125,31145,31148,31192,31195)
2020-07-06 06:13:04
88.254.11.85 attack
88.254.11.85 - - [05/Jul/2020:21:22:07 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
88.254.11.85 - - [05/Jul/2020:21:22:10 +0100] "POST /wp-login.php HTTP/1.1" 302 11 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
88.254.11.85 - - [05/Jul/2020:21:23:08 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-07-06 06:14:30
154.17.8.73 attack
20 attempts against mh-ssh on flame
2020-07-06 06:30:10
128.199.52.45 attackbotsspam
Jul  6 00:11:39 srv-ubuntu-dev3 sshd[93653]: Invalid user elvis from 128.199.52.45
Jul  6 00:11:39 srv-ubuntu-dev3 sshd[93653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45
Jul  6 00:11:39 srv-ubuntu-dev3 sshd[93653]: Invalid user elvis from 128.199.52.45
Jul  6 00:11:42 srv-ubuntu-dev3 sshd[93653]: Failed password for invalid user elvis from 128.199.52.45 port 43102 ssh2
Jul  6 00:16:29 srv-ubuntu-dev3 sshd[94523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45  user=root
Jul  6 00:16:31 srv-ubuntu-dev3 sshd[94523]: Failed password for root from 128.199.52.45 port 41314 ssh2
Jul  6 00:21:22 srv-ubuntu-dev3 sshd[95541]: Invalid user sekretariat from 128.199.52.45
Jul  6 00:21:22 srv-ubuntu-dev3 sshd[95541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45
Jul  6 00:21:22 srv-ubuntu-dev3 sshd[95541]: Invalid user sekretariat
...
2020-07-06 06:23:51
222.186.173.142 attackspambots
Jul  6 00:19:41 vps639187 sshd\[3699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Jul  6 00:19:42 vps639187 sshd\[3699\]: Failed password for root from 222.186.173.142 port 28496 ssh2
Jul  6 00:19:46 vps639187 sshd\[3699\]: Failed password for root from 222.186.173.142 port 28496 ssh2
...
2020-07-06 06:26:21
192.144.137.82 attackbots
$f2bV_matches
2020-07-06 06:21:06
101.108.87.250 attackspam
Jul  5 21:33:37 server2 sshd\[28181\]: Invalid user admin from 101.108.87.250
Jul  5 21:33:39 server2 sshd\[28183\]: User root from node-hdm.pool-101-108.dynamic.totinternet.net not allowed because not listed in AllowUsers
Jul  5 21:33:41 server2 sshd\[28185\]: Invalid user admin from 101.108.87.250
Jul  5 21:33:43 server2 sshd\[28187\]: Invalid user admin from 101.108.87.250
Jul  5 21:33:44 server2 sshd\[28189\]: Invalid user admin from 101.108.87.250
Jul  5 21:33:46 server2 sshd\[28191\]: User apache from node-hdm.pool-101-108.dynamic.totinternet.net not allowed because not listed in AllowUsers
2020-07-06 06:15:01
176.15.75.141 attackspam
Unauthorized connection attempt from IP address 176.15.75.141 on Port 445(SMB)
2020-07-06 06:29:47
79.137.74.57 attack
5x Failed Password
2020-07-06 05:59:51

Recently Reported IPs

191.137.147.248 139.196.42.158 45.72.55.151 168.227.40.26
177.242.151.136 179.84.67.240 51.68.238.214 191.16.101.147
179.103.185.236 93.210.85.251 114.33.164.124 175.43.137.40
61.230.9.135 128.90.22.151 45.140.13.240 125.229.141.185
179.125.121.150 128.90.171.222 189.172.16.127 222.135.95.118