Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.145.239.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43544
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.145.239.157.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 18:42:15 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'Host 157.239.145.198.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 198.145.239.157.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.164.72.156 attack
Dec 10 20:35:12 host sshd[10743]: Invalid user lamar from 185.164.72.156
Dec 10 20:35:12 host sshd[10743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.164.72.156 
Dec 10 20:35:14 host sshd[10743]: Failed password for invalid user lamar from 185.164.72.156 port 50624 ssh2
Dec 10 20:35:14 host sshd[10743]: Received disconnect from 185.164.72.156: 11: Bye Bye [preauth]
Dec 10 20:45:08 host sshd[9567]: Invalid user sirun from 185.164.72.156
Dec 10 20:45:08 host sshd[9567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.164.72.156 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=185.164.72.156
2019-12-14 17:01:07
71.189.47.10 attackspambots
Invalid user champaco from 71.189.47.10 port 48687
2019-12-14 17:12:15
49.234.33.229 attackspambots
Tried sshing with brute force.
2019-12-14 17:22:35
185.176.27.18 attackspambots
12/14/2019-02:34:12.345376 185.176.27.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-14 17:09:30
129.211.63.79 attackspam
Dec 14 09:36:53 legacy sshd[22452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.63.79
Dec 14 09:36:54 legacy sshd[22452]: Failed password for invalid user ident from 129.211.63.79 port 52170 ssh2
Dec 14 09:44:07 legacy sshd[22707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.63.79
...
2019-12-14 17:02:05
104.248.55.99 attackspam
Dec 14 08:14:01 localhost sshd\[20017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.55.99  user=root
Dec 14 08:14:03 localhost sshd\[20017\]: Failed password for root from 104.248.55.99 port 59518 ssh2
Dec 14 08:25:59 localhost sshd\[20222\]: Invalid user admin from 104.248.55.99 port 44018
...
2019-12-14 17:15:01
193.70.33.75 attack
Dec 13 23:05:16 kapalua sshd\[22603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3059199.ip-193-70-33.eu  user=backup
Dec 13 23:05:18 kapalua sshd\[22603\]: Failed password for backup from 193.70.33.75 port 43160 ssh2
Dec 13 23:10:26 kapalua sshd\[23237\]: Invalid user accampo from 193.70.33.75
Dec 13 23:10:26 kapalua sshd\[23237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3059199.ip-193-70-33.eu
Dec 13 23:10:28 kapalua sshd\[23237\]: Failed password for invalid user accampo from 193.70.33.75 port 51048 ssh2
2019-12-14 17:11:51
121.128.200.146 attackspam
Brute-force attempt banned
2019-12-14 17:25:10
171.241.106.145 attackbots
Unauthorized connection attempt detected from IP address 171.241.106.145 to port 445
2019-12-14 16:55:22
222.88.152.58 attackbots
Unauthorized connection attempt detected from IP address 222.88.152.58 to port 445
2019-12-14 17:19:23
96.27.171.75 attackbotsspam
Dec 14 14:08:06 gw1 sshd[19095]: Failed password for root from 96.27.171.75 port 44248 ssh2
Dec 14 14:18:03 gw1 sshd[19505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.27.171.75
...
2019-12-14 17:18:12
218.92.0.171 attackbotsspam
Dec 14 04:18:33 ny01 sshd[26604]: Failed password for root from 218.92.0.171 port 15130 ssh2
Dec 14 04:18:36 ny01 sshd[26604]: Failed password for root from 218.92.0.171 port 15130 ssh2
Dec 14 04:18:40 ny01 sshd[26604]: Failed password for root from 218.92.0.171 port 15130 ssh2
Dec 14 04:18:48 ny01 sshd[26604]: error: maximum authentication attempts exceeded for root from 218.92.0.171 port 15130 ssh2 [preauth]
2019-12-14 17:19:45
81.28.107.43 attackbots
Dec 14 07:26:48  exim[3080]: [1\55] 1ig0t5-0000ng-5Y H=(snake.wpmarks.co) [81.28.107.43] F= rejected after DATA: This message scored 104.5 spam points.
2019-12-14 17:23:03
39.43.8.17 attackbotsspam
1576304853 - 12/14/2019 07:27:33 Host: 39.43.8.17/39.43.8.17 Port: 445 TCP Blocked
2019-12-14 16:56:53
89.42.252.124 attack
Dec 14 09:07:15 game-panel sshd[12929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.42.252.124
Dec 14 09:07:17 game-panel sshd[12929]: Failed password for invalid user sammy from 89.42.252.124 port 19653 ssh2
Dec 14 09:13:30 game-panel sshd[13219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.42.252.124
2019-12-14 17:15:53

Recently Reported IPs

254.6.16.141 90.81.37.203 175.143.45.206 73.203.124.135
236.95.217.94 103.218.178.241 35.187.69.161 171.72.2.203
155.205.125.156 16.229.96.95 202.82.251.30 3.152.166.39
13.66.22.33 27.4.157.230 136.51.213.110 113.40.159.131
141.254.129.202 185.32.203.229 41.93.193.227 18.151.168.220