Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Iran (ISLAMIC Republic Of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.145.115.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2228
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.145.115.94.			IN	A

;; AUTHORITY SECTION:
.			287	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022060802 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 09 07:46:25 CST 2022
;; MSG SIZE  rcvd: 105
Host info
b'Host 94.115.145.2.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 2.145.115.94.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
178.255.24.73 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2019-06-25 21:10:55
116.109.220.140 attack
Unauthorized connection attempt from IP address 116.109.220.140 on Port 445(SMB)
2019-06-25 20:48:28
109.232.108.62 attack
25.06.2019 08:55:27 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2019-06-25 20:47:05
211.72.129.88 attackbotsspam
" "
2019-06-25 20:34:50
122.199.225.53 attackspam
2019-06-25T11:23:01.296151abusebot-4.cloudsearch.cf sshd\[9119\]: Invalid user nagios from 122.199.225.53 port 60420
2019-06-25 20:30:58
113.160.165.122 attackspam
Unauthorized connection attempt from IP address 113.160.165.122 on Port 445(SMB)
2019-06-25 20:32:29
111.40.50.89 attackbotsspam
Jun 25 14:54:30 localhost sshd[13453]: Invalid user server from 111.40.50.89 port 26484
Jun 25 14:54:30 localhost sshd[13453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.40.50.89
Jun 25 14:54:30 localhost sshd[13453]: Invalid user server from 111.40.50.89 port 26484
Jun 25 14:54:32 localhost sshd[13453]: Failed password for invalid user server from 111.40.50.89 port 26484 ssh2
...
2019-06-25 21:09:12
162.243.150.58 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-25 20:49:59
202.65.151.31 attackbotsspam
Jun 25 08:54:53 localhost sshd\[18181\]: Invalid user meng from 202.65.151.31 port 56722
Jun 25 08:54:53 localhost sshd\[18181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.65.151.31
Jun 25 08:54:55 localhost sshd\[18181\]: Failed password for invalid user meng from 202.65.151.31 port 56722 ssh2
2019-06-25 20:58:10
37.49.224.67 attack
firewall-block, port(s): 81/tcp
2019-06-25 20:43:44
113.161.8.44 attackspambots
Unauthorized connection attempt from IP address 113.161.8.44 on Port 445(SMB)
2019-06-25 21:00:50
182.71.130.10 attackspam
Unauthorized connection attempt from IP address 182.71.130.10 on Port 445(SMB)
2019-06-25 20:24:36
156.220.125.246 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-06-25 20:56:33
191.53.251.112 attackbots
Jun 25 01:56:09 mailman postfix/smtpd[21579]: warning: unknown[191.53.251.112]: SASL PLAIN authentication failed: authentication failure
2019-06-25 20:27:22
146.148.126.155 attackbots
Unauthorised access (Jun 25) SRC=146.148.126.155 LEN=40 TTL=235 ID=54321 TCP DPT=3389 WINDOW=65535 SYN
2019-06-25 20:39:26

Recently Reported IPs

112.87.21.218 0.102.105.74 122.59.55.54 192.5.255.65
142.102.201.87 112.74.4.173 45.134.173.72 153.212.229.231
45.38.18.144 233.3.252.89 198.0.191.75 45.86.4.112
45.86.225.3 124.107.235.187 45.116.28.98 144.6.136.59
222.199.235.118 126.208.42.35 189.92.159.104 7.179.125.144