Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.143.131.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58383
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.143.131.145.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010602 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 13:22:28 CST 2025
;; MSG SIZE  rcvd: 108
Host info
145.131.143.192.in-addr.arpa domain name pointer 192-143-131-145.ip.airmobile.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.131.143.192.in-addr.arpa	name = 192-143-131-145.ip.airmobile.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.97.146.194 attackbotsspam
CN_APNIC-HM_<177>1582001702 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 202.97.146.194:51400
2020-02-18 15:54:17
5.200.8.201 attackbotsspam
Brute force VPN server
2020-02-18 16:31:28
96.66.56.125 attackbotsspam
TCP port 3389: Scan and connection
2020-02-18 16:17:07
106.12.5.77 attack
Automatic report - SSH Brute-Force Attack
2020-02-18 16:10:25
222.186.175.202 attackspam
Feb 18 03:04:53 NPSTNNYC01T sshd[4903]: Failed password for root from 222.186.175.202 port 54452 ssh2
Feb 18 03:05:06 NPSTNNYC01T sshd[4903]: error: maximum authentication attempts exceeded for root from 222.186.175.202 port 54452 ssh2 [preauth]
Feb 18 03:05:12 NPSTNNYC01T sshd[4910]: Failed password for root from 222.186.175.202 port 7744 ssh2
...
2020-02-18 16:05:53
49.51.161.141 attack
unauthorized connection attempt
2020-02-18 15:56:42
23.83.212.11 attack
Received: from barn.elm.relay.mailchannels.net (barn.elm.relay.mailchannels.net [23.83.212.11])
	by m0116792.mta.everyone.net (EON-INBOUND) with ESMTP id m0116792.5e0ea4b1.21ca6a3
	for <@antihotmail.com>; Mon, 17 Feb 2020 20:03:18 -0800
Received: from postfix15.newsletterim.com ([TEMPUNAVAIL]. [84.94.225.146])
	(using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384)
	by 0.0.0.0:2500 (trex/5.18.5);
	Tue, 18 Feb 2020 04:03:17 +0000
2020-02-18 16:18:34
61.1.225.239 attackbotsspam
Unauthorised access (Feb 18) SRC=61.1.225.239 LEN=52 TTL=109 ID=4990 DF TCP DPT=445 WINDOW=8192 SYN
2020-02-18 16:09:51
49.49.245.78 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 16:33:34
3.123.154.171 attack
Feb 18 08:16:10 eventyay sshd[18127]: Failed password for root from 3.123.154.171 port 52738 ssh2
Feb 18 08:19:39 eventyay sshd[18160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.123.154.171
Feb 18 08:19:41 eventyay sshd[18160]: Failed password for invalid user ubuntu from 3.123.154.171 port 39505 ssh2
...
2020-02-18 16:16:44
45.141.86.128 attackbotsspam
Feb 18 08:35:00 webmail sshd[32450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.141.86.128 
Feb 18 08:35:02 webmail sshd[32450]: Failed password for invalid user admin from 45.141.86.128 port 64514 ssh2
2020-02-18 16:01:14
92.146.62.116 attackspambots
Automatic report - Port Scan Attack
2020-02-18 15:59:40
43.239.83.78 attack
1582001648 - 02/18/2020 05:54:08 Host: 43.239.83.78/43.239.83.78 Port: 445 TCP Blocked
2020-02-18 16:35:01
182.38.180.61 attackspam
firewall-block, port(s): 23/tcp
2020-02-18 15:56:01
125.137.191.215 attackspambots
Invalid user student3 from 125.137.191.215 port 41676
2020-02-18 16:22:09

Recently Reported IPs

118.206.40.166 211.181.158.146 244.45.210.230 228.23.31.91
34.201.18.169 126.174.186.253 90.26.150.86 179.79.176.126
211.150.113.168 165.92.19.209 53.77.87.42 223.102.246.1
32.240.134.182 5.214.48.197 89.143.186.138 166.172.35.123
90.4.255.53 253.146.23.143 139.165.185.173 123.130.197.138