Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.145.187.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50632
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.145.187.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 19:43:56 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 145.187.145.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.187.145.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.89.8.230 attackspambots
Jun 29 20:58:55 ns37 sshd[12410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.8.230
Jun 29 20:58:55 ns37 sshd[12410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.8.230
2019-06-30 06:14:26
177.47.115.67 attackbots
Jun 30 04:46:11 itv-usvr-01 sshd[21382]: Invalid user wr from 177.47.115.67
Jun 30 04:46:11 itv-usvr-01 sshd[21382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.47.115.67
Jun 30 04:46:11 itv-usvr-01 sshd[21382]: Invalid user wr from 177.47.115.67
Jun 30 04:46:13 itv-usvr-01 sshd[21382]: Failed password for invalid user wr from 177.47.115.67 port 57787 ssh2
Jun 30 04:49:35 itv-usvr-01 sshd[21493]: Invalid user michel from 177.47.115.67
2019-06-30 06:12:25
213.185.88.230 attackspam
Sql/code injection probe
2019-06-30 06:11:08
150.95.129.150 attackspam
2019-06-29T22:05:13.960572abusebot-5.cloudsearch.cf sshd\[18916\]: Invalid user oracle2 from 150.95.129.150 port 39192
2019-06-30 06:08:33
200.66.126.233 attack
Unauthorized SMTP/IMAP/POP3 connection attempt
2019-06-30 06:39:28
189.109.247.149 attack
Jun 27 08:25:47 newdogma sshd[29032]: Invalid user sistemas2 from 189.109.247.149 port 37993
Jun 27 08:25:47 newdogma sshd[29032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.109.247.149
Jun 27 08:25:48 newdogma sshd[29032]: Failed password for invalid user sistemas2 from 189.109.247.149 port 37993 ssh2
Jun 27 08:25:49 newdogma sshd[29032]: Received disconnect from 189.109.247.149 port 37993:11: Bye Bye [preauth]
Jun 27 08:25:49 newdogma sshd[29032]: Disconnected from 189.109.247.149 port 37993 [preauth]
Jun 27 08:28:46 newdogma sshd[29070]: Invalid user mauro from 189.109.247.149 port 15165
Jun 27 08:28:46 newdogma sshd[29070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.109.247.149


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=189.109.247.149
2019-06-30 06:06:37
173.219.80.40 attack
Jun 30 00:18:30 heissa sshd\[24373\]: Invalid user webxmore from 173.219.80.40 port 33336
Jun 30 00:18:30 heissa sshd\[24373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173-219-80-40.pkbgcmta03.com.sta.suddenlink.net
Jun 30 00:18:33 heissa sshd\[24373\]: Failed password for invalid user webxmore from 173.219.80.40 port 33336 ssh2
Jun 30 00:21:31 heissa sshd\[24716\]: Invalid user sammy from 173.219.80.40 port 35818
Jun 30 00:21:31 heissa sshd\[24716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.219.80.40
2019-06-30 06:28:44
178.128.107.61 attackbots
Invalid user himanshu from 178.128.107.61 port 40948
2019-06-30 05:57:08
192.144.132.172 attackbotsspam
Jun 29 23:46:58 MK-Soft-Root1 sshd\[1101\]: Invalid user allison from 192.144.132.172 port 53332
Jun 29 23:46:58 MK-Soft-Root1 sshd\[1101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.132.172
Jun 29 23:47:00 MK-Soft-Root1 sshd\[1101\]: Failed password for invalid user allison from 192.144.132.172 port 53332 ssh2
...
2019-06-30 06:05:35
106.12.28.36 attackbotsspam
Jun 29 23:39:33 host sshd\[27683\]: Invalid user defunts from 106.12.28.36 port 41812
Jun 29 23:39:33 host sshd\[27683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.36
...
2019-06-30 06:02:07
148.255.173.183 attack
Jun 29 22:59:31 vps691689 sshd[12091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.255.173.183
Jun 29 22:59:33 vps691689 sshd[12091]: Failed password for invalid user vnc from 148.255.173.183 port 39318 ssh2
...
2019-06-30 06:23:41
58.218.66.12 attackbotsspam
Probing for vulnerable services
2019-06-30 06:03:01
191.53.197.214 attackspam
SASL PLAIN auth failed: ruser=...
2019-06-30 06:23:26
85.174.190.218 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:52:58,663 INFO [amun_request_handler] PortScan Detected on Port: 445 (85.174.190.218)
2019-06-30 06:40:16
62.210.9.67 attackbotsspam
Automatic report - Web App Attack
2019-06-30 06:30:46

Recently Reported IPs

191.109.112.32 2.138.235.222 7.209.30.197 229.234.24.235
56.190.25.158 17.187.158.20 74.98.232.235 186.164.248.184
7.181.20.183 23.145.1.10 100.86.255.53 197.25.252.198
218.81.192.142 48.245.212.37 119.193.204.25 233.244.171.80
228.253.6.209 234.95.141.18 13.2.153.118 218.9.249.4