Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.45.2.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19066
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.45.2.143.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 13:39:43 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 143.2.45.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 143.2.45.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
79.21.59.9 attack
firewall-block, port(s): 23/tcp
2019-10-04 18:49:07
196.52.43.62 attackspambots
Port Scan: TCP/50070
2019-10-04 18:35:38
106.13.49.20 attack
Oct  4 12:22:03 MK-Soft-VM4 sshd[26334]: Failed password for root from 106.13.49.20 port 45700 ssh2
...
2019-10-04 18:34:48
119.60.255.90 attack
Oct  4 10:25:02 legacy sshd[8586]: Failed password for root from 119.60.255.90 port 58760 ssh2
Oct  4 10:30:04 legacy sshd[8711]: Failed password for root from 119.60.255.90 port 38206 ssh2
...
2019-10-04 18:39:12
67.215.225.114 attackbots
Automatic report - XMLRPC Attack
2019-10-04 18:53:15
222.186.175.216 attack
Oct  4 12:31:25 nextcloud sshd\[21089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Oct  4 12:31:28 nextcloud sshd\[21089\]: Failed password for root from 222.186.175.216 port 45192 ssh2
Oct  4 12:31:32 nextcloud sshd\[21089\]: Failed password for root from 222.186.175.216 port 45192 ssh2
...
2019-10-04 18:32:24
159.203.201.136 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-04 18:41:37
123.214.186.186 attackbotsspam
Oct  4 12:11:57 andromeda sshd\[7572\]: Invalid user admin from 123.214.186.186 port 36762
Oct  4 12:11:57 andromeda sshd\[7572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.214.186.186
Oct  4 12:12:00 andromeda sshd\[7572\]: Failed password for invalid user admin from 123.214.186.186 port 36762 ssh2
2019-10-04 18:26:00
62.234.154.56 attackspambots
Oct  4 04:34:11 venus sshd\[1657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.154.56  user=root
Oct  4 04:34:13 venus sshd\[1657\]: Failed password for root from 62.234.154.56 port 49815 ssh2
Oct  4 04:39:33 venus sshd\[1789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.154.56  user=root
...
2019-10-04 18:12:28
149.56.228.253 attack
firewall-block, port(s): 445/tcp
2019-10-04 18:43:12
183.82.36.176 attackspam
Port scan
2019-10-04 18:39:42
190.144.163.138 attack
Oct  4 07:55:10 www sshd\[226487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.163.138  user=root
Oct  4 07:55:12 www sshd\[226487\]: Failed password for root from 190.144.163.138 port 38032 ssh2
Oct  4 07:59:47 www sshd\[226509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.163.138  user=root
...
2019-10-04 18:32:05
120.241.38.230 attackspam
Oct  4 06:36:14 TORMINT sshd\[13480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.241.38.230  user=root
Oct  4 06:36:17 TORMINT sshd\[13480\]: Failed password for root from 120.241.38.230 port 51382 ssh2
Oct  4 06:41:11 TORMINT sshd\[13859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.241.38.230  user=root
...
2019-10-04 18:43:33
207.154.229.50 attackspambots
Invalid user postgres from 207.154.229.50 port 38436
2019-10-04 18:46:37
92.118.160.1 attackbotsspam
firewall-block, port(s): 445/tcp
2019-10-04 18:46:56

Recently Reported IPs

159.45.2.218 159.45.170.195 159.45.66.186 159.45.86.63
159.46.196.183 159.45.88.121 159.46.193.242 159.53.109.228
159.49.230.81 159.46.196.100 159.50.15.34 159.49.47.135
159.50.188.64 159.49.253.16 159.53.117.68 159.53.116.62
159.53.117.67 159.53.34.8 159.53.44.60 159.53.34.9