Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Türkiye

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.9.44.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23899
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.9.44.145.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122101 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 22 07:21:32 CST 2024
;; MSG SIZE  rcvd: 105
Host info
Host 145.44.9.161.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.44.9.161.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.159.48.155 attackbotsspam
Unauthorized connection attempt detected from IP address 139.159.48.155 to port 445
2020-03-27 21:46:07
169.239.12.172 attackspam
Unauthorized connection attempt from IP address 169.239.12.172 on Port 445(SMB)
2020-03-27 21:50:34
185.200.118.47 attackspam
Mar 27 12:30:02 src: 185.200.118.47 signature match: "MISC Microsoft PPTP communication attempt" (sid: 100082) tcp port: 1723
2020-03-27 21:20:48
185.147.215.13 attackspam
$f2bV_matches
2020-03-27 21:33:59
129.226.179.66 attack
Mar 27 14:04:58 legacy sshd[22909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.179.66
Mar 27 14:05:01 legacy sshd[22909]: Failed password for invalid user admin from 129.226.179.66 port 41220 ssh2
Mar 27 14:06:58 legacy sshd[22972]: Failed password for root from 129.226.179.66 port 55476 ssh2
...
2020-03-27 21:55:51
88.247.154.191 attackspambots
SSH login attempts.
2020-03-27 21:44:07
104.207.151.55 attackspambots
104.207.151.55 - - [27/Mar/2020:13:30:33 +0100] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "-"
104.207.151.55 - - [27/Mar/2020:13:30:49 +0100] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "-"
104.207.151.55 - - [27/Mar/2020:13:31:05 +0100] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "-"
104.207.151.55 - - [27/Mar/2020:13:31:21 +0100] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "-"
104.207.151.55 - - [27/Mar/2020:13:31:36 +0100] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "-"
104.207.151.55 - - [27/Mar/2020:13:31:52 +0100] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "-"
2020-03-27 21:40:52
194.228.3.191 attackbotsspam
Mar 27 13:25:42 124388 sshd[21307]: Invalid user qcd from 194.228.3.191 port 35036
Mar 27 13:25:42 124388 sshd[21307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.228.3.191
Mar 27 13:25:42 124388 sshd[21307]: Invalid user qcd from 194.228.3.191 port 35036
Mar 27 13:25:44 124388 sshd[21307]: Failed password for invalid user qcd from 194.228.3.191 port 35036 ssh2
Mar 27 13:29:17 124388 sshd[21453]: Invalid user zqrong from 194.228.3.191 port 41976
2020-03-27 21:49:44
182.74.217.122 attackspam
SSH login attempts.
2020-03-27 21:37:42
118.45.190.167 attackbots
Mar 27 14:28:01 meumeu sshd[802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.45.190.167 
Mar 27 14:28:03 meumeu sshd[802]: Failed password for invalid user usuario from 118.45.190.167 port 49772 ssh2
Mar 27 14:30:00 meumeu sshd[1030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.45.190.167 
...
2020-03-27 21:56:19
41.232.116.189 attackspambots
SSH login attempts.
2020-03-27 21:25:08
86.201.39.212 attack
Invalid user distro from 86.201.39.212 port 54962
2020-03-27 22:02:12
200.225.250.137 attackspam
Unauthorized connection attempt from IP address 200.225.250.137 on Port 445(SMB)
2020-03-27 21:16:52
185.175.93.78 attackbotsspam
03/27/2020-08:41:59.218696 185.175.93.78 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-27 21:29:44
206.189.181.128 attackspambots
Invalid user nu from 206.189.181.128 port 51728
2020-03-27 21:19:43

Recently Reported IPs

101.234.26.144 6.10.22.93 117.95.16.18 22.98.244.21
58.16.212.167 70.102.173.248 172.77.146.112 6.186.226.164
40.159.221.13 253.99.248.132 154.36.53.6 137.139.40.230
98.250.120.167 200.184.146.1 154.148.96.51 19.143.166.197
55.132.81.212 54.191.130.108 233.67.181.102 30.237.36.153