Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
157.245.136.221 botsattackproxy
SSH bot
2024-04-26 12:58:07
157.245.127.91 attack
Malicious IP / Malware
2024-04-21 02:15:25
157.245.144.229 spambotsattackproxynormal
Yuda
2023-06-10 04:11:00
157.245.144.229 spambotsattackproxynormal
Yuda
2023-06-10 04:10:49
157.245.133.2 attack
Oct  6 06:25:35 ASUS sshd[4096]: Failed password for root from 157.245.133.2 port 51832 ssh2
Oct  6 06:25:35 ASUS sshd[4100]: Failed password for root from 157.245.133.2 port 51836 ssh2
2022-10-07 16:59:38
157.245.133.2 attack
Oct  7 00:38:36 host sshd[1622]: Invalid user wxz from 178.128.196.240 port 34968
Oct  7 00:38:36 host sshd[1615]: Invalid user wxy from 178.128.196.240 port 34478
Oct  7 00:38:36 host sshd[1614]: Invalid user wxy from 178.128.196.240 port 34594
2022-10-07 16:58:23
157.245.133.2 attack
Oct  6 06:25:31 HOST sshd[4021]: Failed password for root from 157.245.133.2 port 51892 ssh2
Oct  6 06:25:31 HOST sshd[4022]: Failed password for root from 157.245.133.2 port 51788 ssh2
Oct  6 06:25:31 HOST sshd[4025]: Failed password for root from 157.245.133.2 port 51674 ssh2
2022-10-07 16:57:27
157.245.108.35 attackspambots
Oct 12 20:56:59 s2 sshd[29173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.108.35 
Oct 12 20:57:01 s2 sshd[29173]: Failed password for invalid user wesley2 from 157.245.108.35 port 32812 ssh2
Oct 12 21:00:48 s2 sshd[29353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.108.35
2020-10-13 03:07:50
157.245.137.145 attack
Invalid user sunny from 157.245.137.145 port 44520
2020-10-13 01:27:38
157.245.106.153 attackbotsspam
157.245.106.153 - - [12/Oct/2020:17:19:26 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.106.153 - - [12/Oct/2020:17:19:28 +0200] "POST /wp-login.php HTTP/1.1" 200 9047 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.106.153 - - [12/Oct/2020:17:19:30 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-10-13 00:30:48
157.245.137.145 attackspambots
157.245.137.145 (US/United States/-), 12 distributed sshd attacks on account [root] in the last 3600 secs
2020-10-12 16:50:36
157.245.106.153 attackbots
157.245.106.153 - - [12/Oct/2020:07:40:25 +0100] "POST /wp-login.php HTTP/1.1" 200 2556 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.106.153 - - [12/Oct/2020:07:40:28 +0100] "POST /wp-login.php HTTP/1.1" 200 2539 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.106.153 - - [12/Oct/2020:07:40:28 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-12 15:52:59
157.245.101.31 attackspam
2020-10-11T17:31:22.372640cyberdyne sshd[399557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.101.31  user=root
2020-10-11T17:31:24.423106cyberdyne sshd[399557]: Failed password for root from 157.245.101.31 port 58756 ssh2
2020-10-11T17:35:31.218209cyberdyne sshd[400736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.101.31  user=root
2020-10-11T17:35:32.786630cyberdyne sshd[400736]: Failed password for root from 157.245.101.31 port 34304 ssh2
...
2020-10-12 03:05:02
157.245.101.31 attackbots
(sshd) Failed SSH login from 157.245.101.31 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 11 06:07:32 optimus sshd[11088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.101.31  user=root
Oct 11 06:07:34 optimus sshd[11088]: Failed password for root from 157.245.101.31 port 38258 ssh2
Oct 11 06:11:27 optimus sshd[12616]: Invalid user jj from 157.245.101.31
Oct 11 06:11:27 optimus sshd[12616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.101.31 
Oct 11 06:11:30 optimus sshd[12616]: Failed password for invalid user jj from 157.245.101.31 port 42476 ssh2
2020-10-11 18:56:54
157.245.196.56 attack
Oct 10 13:24:40 h2646465 sshd[12357]: Invalid user tom1 from 157.245.196.56
Oct 10 13:24:40 h2646465 sshd[12357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.196.56
Oct 10 13:24:40 h2646465 sshd[12357]: Invalid user tom1 from 157.245.196.56
Oct 10 13:24:41 h2646465 sshd[12357]: Failed password for invalid user tom1 from 157.245.196.56 port 52784 ssh2
Oct 10 13:33:18 h2646465 sshd[13625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.196.56  user=root
Oct 10 13:33:20 h2646465 sshd[13625]: Failed password for root from 157.245.196.56 port 36926 ssh2
Oct 10 13:35:40 h2646465 sshd[14168]: Invalid user ITMUser from 157.245.196.56
Oct 10 13:35:40 h2646465 sshd[14168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.196.56
Oct 10 13:35:40 h2646465 sshd[14168]: Invalid user ITMUser from 157.245.196.56
Oct 10 13:35:42 h2646465 sshd[14168]: Failed password for invalid use
2020-10-10 21:34:25
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.245.1.210
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33637
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.245.1.210.			IN	A

;; AUTHORITY SECTION:
.			420	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 13:28:03 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 210.1.245.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 210.1.245.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.160.148.11 attackbots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-01-13 15:36:11
117.247.232.136 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 15:40:06
89.248.160.178 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 89 - port: 8198 proto: TCP cat: Misc Attack
2020-01-13 15:58:23
118.161.153.234 attackspambots
Honeypot attack, port: 81, PTR: 118-161-153-234.dynamic-ip.hinet.net.
2020-01-13 15:33:17
118.24.149.248 attackbots
Unauthorized connection attempt detected from IP address 118.24.149.248 to port 2220 [J]
2020-01-13 15:58:36
115.87.85.177 attack
Honeypot attack, port: 445, PTR: ppp-115-87-85-177.revip4.asianet.co.th.
2020-01-13 15:59:08
37.14.204.41 attackspam
firewall-block, port(s): 37215/tcp
2020-01-13 16:04:21
79.137.2.105 attackbots
Unauthorized connection attempt detected from IP address 79.137.2.105 to port 2220 [J]
2020-01-13 15:38:09
112.8.119.162 attackbots
Automatic report - Port Scan
2020-01-13 15:34:02
49.234.64.252 attackspambots
Jan 13 08:08:18 meumeu sshd[26355]: Failed password for root from 49.234.64.252 port 50694 ssh2
Jan 13 08:12:14 meumeu sshd[27001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.64.252 
Jan 13 08:12:16 meumeu sshd[27001]: Failed password for invalid user maximo from 49.234.64.252 port 45770 ssh2
...
2020-01-13 15:43:14
222.186.175.154 attackspambots
Jan 13 02:58:58 linuxvps sshd\[579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Jan 13 02:59:00 linuxvps sshd\[579\]: Failed password for root from 222.186.175.154 port 37726 ssh2
Jan 13 02:59:14 linuxvps sshd\[579\]: Failed password for root from 222.186.175.154 port 37726 ssh2
Jan 13 02:59:18 linuxvps sshd\[814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Jan 13 02:59:20 linuxvps sshd\[814\]: Failed password for root from 222.186.175.154 port 61892 ssh2
2020-01-13 16:02:40
222.186.31.144 attackspambots
Jan 13 08:30:05 dcd-gentoo sshd[23361]: User root from 222.186.31.144 not allowed because none of user's groups are listed in AllowGroups
Jan 13 08:30:08 dcd-gentoo sshd[23361]: error: PAM: Authentication failure for illegal user root from 222.186.31.144
Jan 13 08:30:05 dcd-gentoo sshd[23361]: User root from 222.186.31.144 not allowed because none of user's groups are listed in AllowGroups
Jan 13 08:30:08 dcd-gentoo sshd[23361]: error: PAM: Authentication failure for illegal user root from 222.186.31.144
Jan 13 08:30:05 dcd-gentoo sshd[23361]: User root from 222.186.31.144 not allowed because none of user's groups are listed in AllowGroups
Jan 13 08:30:08 dcd-gentoo sshd[23361]: error: PAM: Authentication failure for illegal user root from 222.186.31.144
Jan 13 08:30:08 dcd-gentoo sshd[23361]: Failed keyboard-interactive/pam for invalid user root from 222.186.31.144 port 39189 ssh2
...
2020-01-13 15:32:39
36.22.187.34 attackspam
SSH Brute-Force reported by Fail2Ban
2020-01-13 16:05:06
139.59.5.179 attackspam
Wordpress login scanning
2020-01-13 15:39:34
117.0.33.127 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 16:07:16

Recently Reported IPs

157.245.100.132 157.245.100.217 157.245.101.172 157.245.101.12
157.245.0.171 157.245.100.22 157.245.101.235 157.245.101.227
157.245.101.178 157.245.104.92 157.245.102.102 157.245.102.210
157.245.104.190 157.245.103.185 157.245.102.5 157.245.101.93
157.245.105.55 157.245.106.166 157.245.107.108 157.245.106.95