Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cottage Lake

Region: Washington

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.180.242.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54813
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;20.180.242.145.			IN	A

;; AUTHORITY SECTION:
.			199	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020080100 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 01 22:35:29 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 145.242.180.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.242.180.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
168.196.24.70 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-24 07:54:41
13.68.254.96 attackspam
Sep 24 00:42:34 cdc sshd[10686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.254.96  user=root
Sep 24 00:42:37 cdc sshd[10686]: Failed password for invalid user root from 13.68.254.96 port 5088 ssh2
2020-09-24 07:43:00
121.196.23.247 attackbotsspam
SSHD brute force attack detected from [121.196.23.247]
2020-09-24 12:21:24
49.88.112.115 attackspam
Sep 24 02:59:16 gitlab sshd[797607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
Sep 24 02:59:19 gitlab sshd[797607]: Failed password for root from 49.88.112.115 port 16568 ssh2
Sep 24 02:59:23 gitlab sshd[797607]: Failed password for root from 49.88.112.115 port 16568 ssh2
Sep 24 03:04:06 gitlab sshd[798285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
Sep 24 03:04:08 gitlab sshd[798285]: Failed password for root from 49.88.112.115 port 25658 ssh2
...
2020-09-24 12:21:56
119.147.144.22 attackbots
Found on   Github Combined on 3 lists    / proto=6  .  srcport=54323  .  dstport=1433  .     (2878)
2020-09-24 07:42:08
213.141.157.220 attack
213.141.157.220 (RU/Russia/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 23 13:04:48 server5 sshd[12765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.165.107  user=root
Sep 23 13:04:50 server5 sshd[12765]: Failed password for root from 180.76.165.107 port 60396 ssh2
Sep 23 13:04:34 server5 sshd[12713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.141.157.220  user=root
Sep 23 13:04:36 server5 sshd[12713]: Failed password for root from 213.141.157.220 port 55616 ssh2
Sep 23 13:05:56 server5 sshd[13227]: Failed password for root from 164.68.118.155 port 52548 ssh2
Sep 23 13:01:21 server5 sshd[11204]: Failed password for root from 58.185.183.60 port 36062 ssh2

IP Addresses Blocked:

180.76.165.107 (CN/China/-)
2020-09-24 12:08:59
190.218.159.84 attack
Sep 21 21:09:18 roki-contabo sshd\[23994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.218.159.84  user=root
Sep 21 21:09:20 roki-contabo sshd\[23994\]: Failed password for root from 190.218.159.84 port 48566 ssh2
Sep 22 00:08:30 roki-contabo sshd\[25887\]: Invalid user pi from 190.218.159.84
Sep 22 00:08:30 roki-contabo sshd\[25887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.218.159.84
Sep 22 00:08:32 roki-contabo sshd\[25887\]: Failed password for invalid user pi from 190.218.159.84 port 57914 ssh2
...
2020-09-24 12:22:29
52.142.41.110 attack
Sep 23 14:06:08 h2865660 sshd[13327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.142.41.110  user=root
Sep 23 14:06:10 h2865660 sshd[13327]: Failed password for root from 52.142.41.110 port 2819 ssh2
Sep 23 18:32:25 h2865660 sshd[24047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.142.41.110  user=root
Sep 23 18:32:27 h2865660 sshd[24047]: Failed password for root from 52.142.41.110 port 37677 ssh2
Sep 24 01:55:01 h2865660 sshd[9976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.142.41.110  user=root
Sep 24 01:55:03 h2865660 sshd[9976]: Failed password for root from 52.142.41.110 port 6662 ssh2
...
2020-09-24 07:55:56
41.64.172.51 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2020-09-24 07:49:10
78.128.113.121 attackspambots
Sep 24 05:30:35 websrv1.derweidener.de postfix/smtpd[690036]: warning: unknown[78.128.113.121]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 24 05:30:35 websrv1.derweidener.de postfix/smtpd[690036]: lost connection after AUTH from unknown[78.128.113.121]
Sep 24 05:30:39 websrv1.derweidener.de postfix/smtpd[690036]: lost connection after AUTH from unknown[78.128.113.121]
Sep 24 05:30:44 websrv1.derweidener.de postfix/smtpd[690058]: lost connection after AUTH from unknown[78.128.113.121]
Sep 24 05:30:49 websrv1.derweidener.de postfix/smtpd[690036]: lost connection after AUTH from unknown[78.128.113.121]
2020-09-24 12:07:57
121.131.134.206 attackbots
Sep 23 20:05:52 root sshd[25279]: Invalid user admin from 121.131.134.206
...
2020-09-24 12:19:52
51.178.86.97 attack
Sep 24 02:23:50 meumeu sshd[454527]: Invalid user appldev from 51.178.86.97 port 49216
Sep 24 02:23:50 meumeu sshd[454527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.86.97 
Sep 24 02:23:50 meumeu sshd[454527]: Invalid user appldev from 51.178.86.97 port 49216
Sep 24 02:23:52 meumeu sshd[454527]: Failed password for invalid user appldev from 51.178.86.97 port 49216 ssh2
Sep 24 02:27:25 meumeu sshd[454865]: Invalid user radio from 51.178.86.97 port 58066
Sep 24 02:27:25 meumeu sshd[454865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.86.97 
Sep 24 02:27:25 meumeu sshd[454865]: Invalid user radio from 51.178.86.97 port 58066
Sep 24 02:27:26 meumeu sshd[454865]: Failed password for invalid user radio from 51.178.86.97 port 58066 ssh2
Sep 24 02:30:58 meumeu sshd[455122]: Invalid user dashboard from 51.178.86.97 port 38686
...
2020-09-24 12:18:06
45.142.120.179 attackspambots
Sep 24 00:10:57 nlmail01.srvfarm.net postfix/smtpd[596523]: warning: unknown[45.142.120.179]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 24 00:11:02 nlmail01.srvfarm.net postfix/smtpd[596561]: warning: unknown[45.142.120.179]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 24 00:11:07 nlmail01.srvfarm.net postfix/smtpd[596563]: warning: unknown[45.142.120.179]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 24 00:11:13 nlmail01.srvfarm.net postfix/smtpd[596523]: warning: unknown[45.142.120.179]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 24 00:11:15 nlmail01.srvfarm.net postfix/smtpd[596565]: warning: unknown[45.142.120.179]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-24 07:47:41
51.144.45.198 attack
Sep 24 00:50:55 web1 sshd[6944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.144.45.198  user=root
Sep 24 00:50:56 web1 sshd[6944]: Failed password for root from 51.144.45.198 port 56129 ssh2
Sep 24 00:50:55 web1 sshd[6943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.144.45.198  user=root
Sep 24 00:50:56 web1 sshd[6943]: Failed password for root from 51.144.45.198 port 56124 ssh2
Sep 24 03:53:42 web1 sshd[15549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.144.45.198  user=root
Sep 24 03:53:44 web1 sshd[15549]: Failed password for root from 51.144.45.198 port 29978 ssh2
Sep 24 03:53:42 web1 sshd[15550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.144.45.198  user=root
Sep 24 03:53:44 web1 sshd[15550]: Failed password for root from 51.144.45.198 port 29973 ssh2
Sep 24 09:19:03 web1 sshd[28695]: pam_un
...
2020-09-24 07:45:25
40.117.41.110 attack
Sep 24 02:27:36 root sshd[2319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.41.110  user=root
Sep 24 02:27:38 root sshd[2319]: Failed password for root from 40.117.41.110 port 45397 ssh2
...
2020-09-24 07:45:49

Recently Reported IPs

181.247.239.87 52.10.233.138 15.230.252.20 164.239.42.218
129.115.228.212 176.26.134.99 41.84.239.106 187.64.196.132
153.225.5.221 165.181.53.60 185.128.133.250 212.129.59.36
148.194.174.37 80.2.102.9 119.126.114.213 221.178.17.101
106.140.134.217 121.73.201.8 8.83.143.199 156.227.25.160