Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
157.245.214.36 attack
333. On Jul 14 2020 experienced a Brute Force SSH login attempt -> 68 unique times by 157.245.214.36.
2020-07-15 07:45:00
157.245.214.36 attackspam
*Port Scan* detected from 157.245.214.36 (US/United States/New Jersey/Clifton/-). 4 hits in the last 156 seconds
2020-07-14 13:41:52
157.245.214.36 attackbotsspam
Jul  9 23:24:47 ajax sshd[4060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.214.36 
Jul  9 23:24:49 ajax sshd[4060]: Failed password for invalid user company from 157.245.214.36 port 51906 ssh2
2020-07-10 07:03:26
157.245.214.36 attackspam
Jun 23 06:04:01 ns382633 sshd\[2741\]: Invalid user 101 from 157.245.214.36 port 41116
Jun 23 06:04:01 ns382633 sshd\[2741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.214.36
Jun 23 06:04:03 ns382633 sshd\[2741\]: Failed password for invalid user 101 from 157.245.214.36 port 41116 ssh2
Jun 23 06:10:26 ns382633 sshd\[4327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.214.36  user=root
Jun 23 06:10:28 ns382633 sshd\[4327\]: Failed password for root from 157.245.214.36 port 47344 ssh2
2020-06-23 14:19:29
157.245.214.36 attack
Jun 19 07:52:29 dignus sshd[21063]: Failed password for invalid user his from 157.245.214.36 port 43204 ssh2
Jun 19 07:55:54 dignus sshd[21423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.214.36  user=root
Jun 19 07:55:57 dignus sshd[21423]: Failed password for root from 157.245.214.36 port 43594 ssh2
Jun 19 07:59:15 dignus sshd[21725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.214.36  user=root
Jun 19 07:59:17 dignus sshd[21725]: Failed password for root from 157.245.214.36 port 43984 ssh2
...
2020-06-20 01:17:38
157.245.214.36 attackbots
SSH Attack
2020-06-17 14:33:16
157.245.214.36 attack
Jun 16 17:04:39 mout sshd[12269]: Connection closed by 157.245.214.36 port 55964 [preauth]
2020-06-16 23:21:40
157.245.214.230 attackspambots
Mar 31 05:51:04 debian-2gb-nbg1-2 kernel: \[7885719.091560\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=157.245.214.230 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=53 ID=0 DF PROTO=TCP SPT=22 DPT=61101 WINDOW=29200 RES=0x00 ACK SYN URGP=0
2020-03-31 18:12:17
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.245.214.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11257
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.245.214.126.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 13:28:41 CST 2022
;; MSG SIZE  rcvd: 108
Host info
126.214.245.157.in-addr.arpa domain name pointer server1.rovermarketing.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
126.214.245.157.in-addr.arpa	name = server1.rovermarketing.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
134.73.7.114 attackbotsspam
HTTP SQL Injection Attempt
2019-08-21 03:34:44
2a0b:f4c0:16c:3::1 attackbotsspam
Credential brute-force attacks on webpage logins and services like SSH, FTP, SIP, SMTP, RDP, etc. This category is seperate from DDoS attacks -  UTC+3:2019:08:20-17:50:56 SCRIPT:/index.php?***:  PORT:443
2019-08-21 03:21:51
129.213.96.241 attack
Aug 20 22:08:44 dedicated sshd[16983]: Invalid user musicbot from 129.213.96.241 port 40767
2019-08-21 04:12:06
223.197.175.171 attackspam
Invalid user hadoop from 223.197.175.171 port 42854
2019-08-21 03:20:42
46.101.27.6 attackbots
Aug 20 19:45:33 sshgateway sshd\[1018\]: Invalid user test6 from 46.101.27.6
Aug 20 19:45:33 sshgateway sshd\[1018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.27.6
Aug 20 19:45:35 sshgateway sshd\[1018\]: Failed password for invalid user test6 from 46.101.27.6 port 47538 ssh2
2019-08-21 03:48:05
50.117.89.76 attackspambots
firewall-block, port(s): 60001/tcp
2019-08-21 04:19:09
80.211.249.106 attackbots
Aug 20 20:04:49 vps691689 sshd[936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.249.106
Aug 20 20:04:51 vps691689 sshd[936]: Failed password for invalid user jboss from 80.211.249.106 port 39234 ssh2
...
2019-08-21 03:59:55
14.183.64.57 attackspambots
Aug 21 02:19:11 webhost01 sshd[17488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.183.64.57
Aug 21 02:19:12 webhost01 sshd[17488]: Failed password for invalid user bud from 14.183.64.57 port 39286 ssh2
...
2019-08-21 03:35:57
188.131.134.157 attackbotsspam
Aug 20 18:07:32 ns341937 sshd[26871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.134.157
Aug 20 18:07:34 ns341937 sshd[26871]: Failed password for invalid user albert from 188.131.134.157 port 48882 ssh2
Aug 20 18:26:06 ns341937 sshd[30573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.134.157
...
2019-08-21 03:16:05
41.60.239.19 attackspam
Aug 20 23:54:34 our-server-hostname postfix/smtpd[28195]: connect from unknown[41.60.239.19]
Aug x@x
Aug x@x
Aug 20 23:54:37 our-server-hostname postfix/smtpd[28195]: lost connection after RCPT from unknown[41.60.239.19]
Aug 20 23:54:37 our-server-hostname postfix/smtpd[28195]: disconnect from unknown[41.60.239.19]
Aug 21 00:04:42 our-server-hostname postfix/smtpd[29935]: connect from unknown[41.60.239.19]
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug 21 00:04:52 our-server-hostname postfix/smtpd[29935]: lost connection after RCPT from unknown[41.60.239.19]
Aug 21 00:04:52 our-server-hostname postfix/smtpd[29935]: disconnect from unknown[41.60.239.19]
Aug 21 00:08:11 our-server-hostname postfix/smtpd[27830]: connect from unknown[41.60.239.19]
Aug x@x
Aug 21 00:08:14 our-server-hostname postfix/smtpd[27830]: lost connection after RCPT from unknown[41.60.239.19]
Aug 21 00:08:14 our-server-hostname postfix/smtpd[27830]: disconnect from unknown[41.60.239.19]
A........
-------------------------------
2019-08-21 04:13:13
138.197.105.79 attackspam
Aug 20 21:23:07 ncomp sshd[10769]: Invalid user test from 138.197.105.79
Aug 20 21:23:07 ncomp sshd[10769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.105.79
Aug 20 21:23:07 ncomp sshd[10769]: Invalid user test from 138.197.105.79
Aug 20 21:23:09 ncomp sshd[10769]: Failed password for invalid user test from 138.197.105.79 port 39592 ssh2
2019-08-21 03:40:04
202.126.208.122 attackbots
Aug 20 18:39:12 [munged] sshd[29932]: Invalid user cyrus from 202.126.208.122 port 54766
Aug 20 18:39:12 [munged] sshd[29932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.126.208.122
2019-08-21 03:42:03
51.68.173.108 attackbotsspam
Aug 20 19:59:46 mail sshd\[10430\]: Failed password for invalid user pvm from 51.68.173.108 port 48658 ssh2
Aug 20 20:14:57 mail sshd\[10814\]: Invalid user csgo from 51.68.173.108 port 58038
...
2019-08-21 03:18:19
86.162.208.118 attackbots
DATE:2019-08-20 16:50:04, IP:86.162.208.118, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-08-21 04:17:38
81.93.88.31 attackbots
2019-08-20 09:50:19 H=(lumpress.it) [81.93.88.31]:50105 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/81.93.88.31)
2019-08-20 09:50:20 H=(lumpress.it) [81.93.88.31]:50105 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/81.93.88.31)
2019-08-20 09:50:22 H=(lumpress.it) [81.93.88.31]:50105 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/81.93.88.31)
...
2019-08-21 04:03:06

Recently Reported IPs

157.245.231.81 157.245.228.158 157.245.217.255 157.245.224.134
157.245.235.12 157.245.232.140 157.245.24.26 157.245.237.104
157.245.244.194 157.245.242.152 157.245.245.11 157.245.243.222
157.245.243.65 157.245.248.133 157.245.248.21 157.245.247.139
157.245.244.207 157.245.241.108 157.245.25.130 157.245.253.180