Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.189.245.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26165
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.189.245.225.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 17:12:13 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 225.245.189.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 225.245.189.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.104.249.125 attackspam
2020-05-26T01:24:22.064580amanda2.illicoweb.com sshd\[37522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=egp.ftpby.ru  user=root
2020-05-26T01:24:24.283730amanda2.illicoweb.com sshd\[37522\]: Failed password for root from 185.104.249.125 port 51468 ssh2
2020-05-26T01:24:30.283490amanda2.illicoweb.com sshd\[37529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=egp.ftpby.ru  user=root
2020-05-26T01:24:32.266973amanda2.illicoweb.com sshd\[37529\]: Failed password for root from 185.104.249.125 port 52470 ssh2
2020-05-26T01:24:38.688515amanda2.illicoweb.com sshd\[37531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=egp.ftpby.ru  user=root
...
2020-05-26 11:22:34
143.255.150.81 attackspambots
2020-05-26T01:44:29.799762abusebot-6.cloudsearch.cf sshd[28240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.150.81  user=root
2020-05-26T01:44:32.153043abusebot-6.cloudsearch.cf sshd[28240]: Failed password for root from 143.255.150.81 port 44682 ssh2
2020-05-26T01:47:47.138053abusebot-6.cloudsearch.cf sshd[28423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.150.81  user=root
2020-05-26T01:47:49.340690abusebot-6.cloudsearch.cf sshd[28423]: Failed password for root from 143.255.150.81 port 37048 ssh2
2020-05-26T01:51:05.261462abusebot-6.cloudsearch.cf sshd[28643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.150.81  user=root
2020-05-26T01:51:07.644998abusebot-6.cloudsearch.cf sshd[28643]: Failed password for root from 143.255.150.81 port 57668 ssh2
2020-05-26T01:54:25.917072abusebot-6.cloudsearch.cf sshd[28867]: pam_unix(sshd:auth):
...
2020-05-26 11:26:49
106.12.55.57 attack
May 26 04:30:25 icinga sshd[2803]: Failed password for root from 106.12.55.57 port 58392 ssh2
May 26 04:34:48 icinga sshd[8966]: Failed password for root from 106.12.55.57 port 55912 ssh2
...
2020-05-26 10:53:42
167.99.204.251 attack
167.99.204.251 - - [26/May/2020:01:24:46 +0200] "GET /wp-login.php HTTP/1.1" 200 6287 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.204.251 - - [26/May/2020:01:24:48 +0200] "POST /wp-login.php HTTP/1.1" 200 6517 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.204.251 - - [26/May/2020:01:24:49 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-26 11:14:08
184.106.81.166 attackspam
Scanned 1 times in the last 24 hours on port 5060
2020-05-26 11:01:51
186.179.74.190 attackbots
SSH Brute-Forcing (server1)
2020-05-26 11:06:13
149.202.4.243 attackspam
May 25 19:51:36 NPSTNNYC01T sshd[28669]: Failed password for root from 149.202.4.243 port 60952 ssh2
May 25 19:53:54 NPSTNNYC01T sshd[28889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.4.243
May 25 19:53:56 NPSTNNYC01T sshd[28889]: Failed password for invalid user secretar from 149.202.4.243 port 37354 ssh2
...
2020-05-26 11:13:14
218.92.0.212 attackspambots
k+ssh-bruteforce
2020-05-26 11:03:44
138.255.0.27 attackbotsspam
138.255.0.27 (BR/Brazil/-), 12 distributed sshd attacks on account [root] in the last 3600 secs
2020-05-26 11:21:16
222.186.30.35 attackspam
May 25 23:16:55 ny01 sshd[16863]: Failed password for root from 222.186.30.35 port 44638 ssh2
May 25 23:17:15 ny01 sshd[16922]: Failed password for root from 222.186.30.35 port 37502 ssh2
May 25 23:17:17 ny01 sshd[16922]: Failed password for root from 222.186.30.35 port 37502 ssh2
2020-05-26 11:19:41
68.183.31.167 attackbotsspam
68.183.31.167 - - [26/May/2020:04:29:05 +0200] "GET /wp-login.php HTTP/1.1" 200 5865 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.31.167 - - [26/May/2020:04:29:06 +0200] "POST /wp-login.php HTTP/1.1" 200 6116 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.31.167 - - [26/May/2020:04:29:07 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-26 11:03:18
109.66.38.96 attackbots
[Tue May 26 00:16:13 2020] - Syn Flood From IP: 109.66.38.96 Port: 50760
2020-05-26 11:17:06
103.129.64.247 attackspambots
DATE:2020-05-26 01:24:44, IP:103.129.64.247, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-05-26 11:17:46
54.203.208.1 attackbotsspam
26.05.2020 01:25:20 - Bad Robot 
Ignore Robots.txt
2020-05-26 10:55:54
51.79.57.12 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 38 - port: 5060 proto: UDP cat: Misc Attack
2020-05-26 10:58:40

Recently Reported IPs

15.87.60.220 136.60.186.89 65.53.238.205 37.104.153.218
90.48.238.49 85.109.130.190 197.150.141.208 253.253.25.205
252.253.116.199 197.60.165.196 174.16.217.221 91.128.249.108
170.192.113.146 154.83.12.147 161.115.16.223 70.62.23.58
127.140.153.55 209.70.227.144 13.22.98.204 100.58.188.255