Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.155.139.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64766
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.155.139.145.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 21:52:00 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 145.139.155.169.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.139.155.169.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.140.243.221 attack
Unauthorized connection attempt detected from IP address 112.140.243.221 to port 23 [J]
2020-02-29 19:27:52
111.204.10.249 attack
Port 1433 Scan
2020-02-29 19:12:39
165.22.252.73 attackspam
Feb 29 04:41:35 nbi10206 sshd[15222]: Invalid user hrm from 165.22.252.73 port 44060
Feb 29 04:41:37 nbi10206 sshd[15222]: Failed password for invalid user hrm from 165.22.252.73 port 44060 ssh2
Feb 29 04:41:37 nbi10206 sshd[15222]: Received disconnect from 165.22.252.73 port 44060:11: Bye Bye [preauth]
Feb 29 04:41:37 nbi10206 sshd[15222]: Disconnected from 165.22.252.73 port 44060 [preauth]
Feb 29 04:50:43 nbi10206 sshd[17682]: Invalid user mella from 165.22.252.73 port 54578
Feb 29 04:50:45 nbi10206 sshd[17682]: Failed password for invalid user mella from 165.22.252.73 port 54578 ssh2
Feb 29 04:50:45 nbi10206 sshd[17682]: Received disconnect from 165.22.252.73 port 54578:11: Bye Bye [preauth]
Feb 29 04:50:45 nbi10206 sshd[17682]: Disconnected from 165.22.252.73 port 54578 [preauth]
Feb 29 04:55:27 nbi10206 sshd[18857]: Invalid user ubuntu from 165.22.252.73 port 45640
Feb 29 04:55:29 nbi10206 sshd[18857]: Failed password for invalid user ubuntu from 165.22.252.73 por........
-------------------------------
2020-02-29 19:00:04
104.131.190.193 attackbots
Feb 29 11:20:41 MK-Soft-VM6 sshd[11321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.190.193 
Feb 29 11:20:43 MK-Soft-VM6 sshd[11321]: Failed password for invalid user justinbiberx from 104.131.190.193 port 37986 ssh2
...
2020-02-29 19:07:24
58.246.88.50 attack
$f2bV_matches
2020-02-29 19:02:46
5.196.198.147 attack
Feb 29 07:37:26 MK-Soft-VM8 sshd[3442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.198.147 
Feb 29 07:37:27 MK-Soft-VM8 sshd[3442]: Failed password for invalid user hxx from 5.196.198.147 port 44906 ssh2
...
2020-02-29 19:35:41
27.75.143.30 attackbots
Unauthorized connection attempt detected from IP address 27.75.143.30 to port 23 [J]
2020-02-29 19:28:23
112.123.110.231 attack
Unauthorized connection attempt detected from IP address 112.123.110.231 to port 23 [J]
2020-02-29 19:33:40
141.98.80.175 attackbots
...
2020-02-29 19:09:49
113.125.26.101 attackbotsspam
Feb 29 10:40:53 gw1 sshd[28853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.26.101
Feb 29 10:40:55 gw1 sshd[28853]: Failed password for invalid user huhao from 113.125.26.101 port 43646 ssh2
...
2020-02-29 19:08:38
5.74.63.129 attackbotsspam
Feb 29 06:35:20 mxgate1 postfix/postscreen[25639]: CONNECT from [5.74.63.129]:63523 to [176.31.12.44]:25
Feb 29 06:35:20 mxgate1 postfix/dnsblog[25641]: addr 5.74.63.129 listed by domain b.barracudacentral.org as 127.0.0.2
Feb 29 06:35:22 mxgate1 postfix/postscreen[25639]: PREGREET 19 after 1.7 from [5.74.63.129]:63523: HELO lgafopmo.com

Feb 29 06:35:23 mxgate1 postfix/dnsblog[25643]: addr 5.74.63.129 listed by domain zen.spamhaus.org as 127.0.0.11
Feb 29 06:35:23 mxgate1 postfix/dnsblog[25643]: addr 5.74.63.129 listed by domain zen.spamhaus.org as 127.0.0.4
Feb 29 06:35:23 mxgate1 postfix/dnsblog[25644]: addr 5.74.63.129 listed by domain cbl.abuseat.org as 127.0.0.2
Feb 29 06:35:25 mxgate1 postfix/postscreen[25639]: DNSBL rank 4 for [5.74.63.129]:63523
Feb x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.74.63.129
2020-02-29 19:08:18
45.164.8.244 attackspambots
Feb 29 12:01:58 MK-Soft-VM8 sshd[8003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.164.8.244 
Feb 29 12:02:01 MK-Soft-VM8 sshd[8003]: Failed password for invalid user redis from 45.164.8.244 port 40764 ssh2
...
2020-02-29 19:26:15
218.92.0.179 attack
Feb 29 11:46:16 vps647732 sshd[27130]: Failed password for root from 218.92.0.179 port 11515 ssh2
Feb 29 11:46:28 vps647732 sshd[27130]: error: maximum authentication attempts exceeded for root from 218.92.0.179 port 11515 ssh2 [preauth]
...
2020-02-29 18:59:38
185.36.81.57 attackbotsspam
2020-02-29 12:12:17 dovecot_login authenticator failed for \(User\) \[185.36.81.57\]: 535 Incorrect authentication data \(set_id=jjjj\)
2020-02-29 12:14:51 dovecot_login authenticator failed for \(User\) \[185.36.81.57\]: 535 Incorrect authentication data \(set_id=123@no-server.de\)
2020-02-29 12:15:01 dovecot_login authenticator failed for \(User\) \[185.36.81.57\]: 535 Incorrect authentication data \(set_id=jjjj\)
2020-02-29 12:15:03 dovecot_login authenticator failed for \(User\) \[185.36.81.57\]: 535 Incorrect authentication data \(set_id=jjjj\)
2020-02-29 12:15:03 dovecot_login authenticator failed for \(User\) \[185.36.81.57\]: 535 Incorrect authentication data \(set_id=jjjj\)
...
2020-02-29 19:27:32
112.167.40.248 attack
Unauthorized connection attempt detected from IP address 112.167.40.248 to port 23 [J]
2020-02-29 19:13:48

Recently Reported IPs

229.95.155.183 15.186.177.0 24.227.118.178 71.249.151.105
198.25.158.174 15.149.26.204 12.219.156.191 173.203.20.167
209.215.139.238 44.214.15.143 146.144.189.206 163.142.65.120
238.194.141.103 18.47.176.225 36.233.43.242 247.194.58.78
96.63.18.164 238.46.225.192 16.218.229.152 13.170.143.61