Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.45.14.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46328
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.45.14.249.			IN	A

;; AUTHORITY SECTION:
.			493	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 19:27:23 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 249.14.45.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 249.14.45.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.82.65.90 attackspambots
SmallBizIT.US 3 packets to udp(53,123,389)
2020-05-31 06:19:46
106.52.17.214 attackspambots
100. On May 30 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 106.52.17.214.
2020-05-31 06:15:24
119.29.195.187 attackspambots
May 30 23:15:31 ns381471 sshd[21862]: Failed password for root from 119.29.195.187 port 50790 ssh2
2020-05-31 05:52:03
122.114.113.158 attack
Invalid user mario from 122.114.113.158 port 56775
2020-05-31 06:27:06
188.226.167.212 attackbotsspam
Invalid user jasmine from 188.226.167.212 port 50838
2020-05-31 06:06:20
125.214.58.55 attackspam
Automatic report - Port Scan Attack
2020-05-31 05:49:12
190.189.12.210 attack
2020-05-30T21:42:43.806291server.espacesoutien.com sshd[15033]: Failed password for invalid user six from 190.189.12.210 port 41296 ssh2
2020-05-30T21:47:04.740008server.espacesoutien.com sshd[18236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.189.12.210  user=root
2020-05-30T21:47:06.244724server.espacesoutien.com sshd[18236]: Failed password for root from 190.189.12.210 port 46526 ssh2
2020-05-30T21:51:24.473054server.espacesoutien.com sshd[21380]: Invalid user lab from 190.189.12.210 port 51742
...
2020-05-31 05:56:27
222.186.180.142 attack
Unauthorized connection attempt detected from IP address 222.186.180.142 to port 22
2020-05-31 06:01:59
69.89.16.161 attackbotsspam
SpamScore above: 10.0
2020-05-31 06:12:52
24.93.200.253 attackspam
Unauthorized connection attempt detected from IP address 24.93.200.253 to port 80
2020-05-31 06:20:17
180.76.162.19 attack
2020-05-30T20:42:33.026333shield sshd\[3033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.162.19  user=root
2020-05-30T20:42:35.444153shield sshd\[3033\]: Failed password for root from 180.76.162.19 port 45162 ssh2
2020-05-30T20:45:42.953984shield sshd\[3540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.162.19  user=root
2020-05-30T20:45:44.318053shield sshd\[3540\]: Failed password for root from 180.76.162.19 port 38414 ssh2
2020-05-30T20:48:49.671758shield sshd\[3952\]: Invalid user crystal from 180.76.162.19 port 59920
2020-05-31 06:18:13
156.236.71.206 attackspambots
Invalid user lucian from 156.236.71.206 port 44118
2020-05-31 06:26:49
192.144.239.87 attackbots
Failed password for invalid user usuario from 192.144.239.87 port 55116 ssh2
2020-05-31 06:17:08
46.101.223.54 attack
Fail2Ban Ban Triggered
2020-05-31 06:24:03
93.115.1.195 attackbotsspam
" "
2020-05-31 06:03:23

Recently Reported IPs

159.28.117.45 159.28.220.139 159.45.14.75 159.28.166.99
159.45.170.213 159.28.19.172 159.45.141.26 159.48.53.95
159.48.55.20 159.49.47.139 159.46.193.195 159.45.88.54
159.45.2.213 159.49.253.17 159.53.113.191 159.53.100.52
159.53.118.57 159.53.117.170 159.53.34.236 159.53.60.228