Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.114.66.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40125
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.114.66.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 14:02:16 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 145.66.114.161.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.66.114.161.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.67.254.244 attackbotsspam
Tried sshing with brute force.
2020-07-27 17:29:42
141.98.10.198 attackbots
IP attempted unauthorised action
2020-07-27 17:13:11
154.113.1.142 attackspam
(sshd) Failed SSH login from 154.113.1.142 (NG/Nigeria/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 27 09:57:16 amsweb01 sshd[16554]: Invalid user igor from 154.113.1.142 port 2408
Jul 27 09:57:19 amsweb01 sshd[16554]: Failed password for invalid user igor from 154.113.1.142 port 2408 ssh2
Jul 27 10:11:40 amsweb01 sshd[18576]: Invalid user ubuntu from 154.113.1.142 port 12746
Jul 27 10:11:42 amsweb01 sshd[18576]: Failed password for invalid user ubuntu from 154.113.1.142 port 12746 ssh2
Jul 27 10:16:13 amsweb01 sshd[19228]: Invalid user test from 154.113.1.142 port 9180
2020-07-27 17:02:32
5.135.224.151 attackspam
SSH Brute Force
2020-07-27 16:57:48
46.41.134.9 attack
 TCP (SYN) 46.41.134.9:58146 -> port 22, len 44
2020-07-27 17:05:19
222.186.30.112 attackbots
Jul 27 10:19:11 rocket sshd[6423]: Failed password for root from 222.186.30.112 port 43170 ssh2
Jul 27 10:19:24 rocket sshd[6438]: Failed password for root from 222.186.30.112 port 58056 ssh2
...
2020-07-27 17:21:20
78.162.121.115 attackbotsspam
Unauthorized connection attempt detected from IP address 78.162.121.115 to port 81
2020-07-27 17:18:16
124.251.110.164 attackbotsspam
Jul 27 09:04:28 rancher-0 sshd[602420]: Invalid user postgres from 124.251.110.164 port 49536
...
2020-07-27 17:11:13
138.197.95.2 attackspam
138.197.95.2 - - [27/Jul/2020:07:43:58 +0200] "POST /xmlrpc.php HTTP/1.1" 403 10518 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.95.2 - - [27/Jul/2020:08:01:00 +0200] "POST /xmlrpc.php HTTP/1.1" 403 16471 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-27 17:30:47
183.63.172.52 attackspambots
Jul 27 07:00:26 plg sshd[10524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.63.172.52 
Jul 27 07:00:28 plg sshd[10524]: Failed password for invalid user ogpbot from 183.63.172.52 port 2412 ssh2
Jul 27 07:02:56 plg sshd[10557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.63.172.52 
Jul 27 07:02:58 plg sshd[10557]: Failed password for invalid user dm from 183.63.172.52 port 2413 ssh2
Jul 27 07:05:25 plg sshd[10605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.63.172.52 
Jul 27 07:05:27 plg sshd[10605]: Failed password for invalid user lui from 183.63.172.52 port 2414 ssh2
...
2020-07-27 17:14:30
118.25.141.194 attackspam
frenzy
2020-07-27 17:01:12
210.57.208.9 attackspambots
Automatic report - Banned IP Access
2020-07-27 17:10:38
216.244.66.202 attackbotsspam
20 attempts against mh-misbehave-ban on float
2020-07-27 17:16:11
1.4.246.223 attackspambots
Icarus honeypot on github
2020-07-27 17:14:06
69.144.62.43 attackbotsspam
Brute forcing email accounts
2020-07-27 17:01:28

Recently Reported IPs

78.170.23.94 83.225.178.125 52.58.58.116 86.24.219.121
74.10.177.157 203.156.182.43 22.90.33.217 41.150.139.145
103.82.28.232 230.176.2.59 203.1.8.144 90.73.3.206
142.208.90.117 81.255.21.57 236.38.190.246 114.142.151.122
138.80.214.167 124.139.199.67 174.28.172.10 17.168.176.36