Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: City of Westminster

Region: England

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 205.252.145.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2306
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;205.252.145.34.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070101 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jul 01 13:40:38 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 34.145.252.205.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.145.252.205.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
41.38.42.52 attack
Telnet/23 MH Probe, BF, Hack -
2019-10-17 00:46:10
216.244.66.195 attackbots
[Wed Oct 16 17:14:09.859228 2019] [access_compat:error] [pid 11485:tid 139734365021952] [client 216.244.66.195:30304] AH01797: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/favicon.ico
[Wed Oct 16 17:16:45.660581 2019] [access_compat:error] [pid 22875:tid 139734277945088] [client 216.244.66.195:42880] AH01797: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/category
[Wed Oct 16 17:18:59.068843 2019] [access_compat:error] [pid 11573:tid 139734277945088] [client 216.244.66.195:53436] AH01797: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/brooke-wylde-36-double-d-natural-tits
[Wed Oct 16 17:20:59.117620 2019] [access_compat:error] [pid 11484:tid 139734135269120] [client 216.244.66.195:64434] AH01797: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/abby-lee-brazil-in-my-friends-hot-girl
...
2019-10-17 00:26:01
186.19.57.79 attackspam
Automatic report - Port Scan Attack
2019-10-17 00:32:36
200.194.28.116 attackbots
Oct 16 18:35:29 tux-35-217 sshd\[14769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.194.28.116  user=root
Oct 16 18:35:31 tux-35-217 sshd\[14769\]: Failed password for root from 200.194.28.116 port 41912 ssh2
Oct 16 18:35:33 tux-35-217 sshd\[14769\]: Failed password for root from 200.194.28.116 port 41912 ssh2
Oct 16 18:35:35 tux-35-217 sshd\[14769\]: Failed password for root from 200.194.28.116 port 41912 ssh2
...
2019-10-17 00:43:39
23.101.148.122 attackspam
failed_logins
2019-10-17 00:53:12
163.182.255.102 attack
Oct 16 11:09:56 sshgateway sshd\[473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.182.255.102  user=root
Oct 16 11:09:58 sshgateway sshd\[473\]: Failed password for root from 163.182.255.102 port 53375 ssh2
Oct 16 11:18:39 sshgateway sshd\[526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.182.255.102  user=root
2019-10-17 00:21:40
200.24.16.214 attack
Unauthorised access (Oct 16) SRC=200.24.16.214 LEN=52 TOS=0x10 PREC=0x40 TTL=115 ID=25070 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-17 00:47:31
92.119.160.106 attack
Oct 16 18:21:05 mc1 kernel: \[2529235.311790\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=40004 PROTO=TCP SPT=48793 DPT=10644 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 16 18:21:22 mc1 kernel: \[2529253.115268\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=50956 PROTO=TCP SPT=48793 DPT=11150 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 16 18:22:25 mc1 kernel: \[2529315.256428\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=44875 PROTO=TCP SPT=48793 DPT=11240 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-17 00:29:21
51.83.73.160 attack
2019-10-16T16:17:44.255542abusebot.cloudsearch.cf sshd\[27024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.ip-51-83-73.eu  user=daemon
2019-10-17 00:24:33
196.52.43.101 attackspambots
firewall-block, port(s): 8090/tcp
2019-10-17 00:50:12
183.83.83.57 attackspambots
SMB Server BruteForce Attack
2019-10-17 00:21:04
188.190.215.109 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-17 00:22:25
73.187.89.63 attackspambots
$f2bV_matches
2019-10-17 00:11:31
129.204.111.107 attackspam
Oct 16 17:36:06 server sshd\[9845\]: Failed password for invalid user qwe123 from 129.204.111.107 port 34166 ssh2
Oct 16 18:40:46 server sshd\[30543\]: Invalid user H4ck3r@2017 from 129.204.111.107
Oct 16 18:40:46 server sshd\[30543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.111.107 
Oct 16 18:40:47 server sshd\[30543\]: Failed password for invalid user H4ck3r@2017 from 129.204.111.107 port 42440 ssh2
Oct 16 18:48:25 server sshd\[32653\]: Invalid user mohith from 129.204.111.107
...
2019-10-17 00:21:25
51.38.57.78 attack
Invalid user funmiapata from 51.38.57.78 port 55996
2019-10-17 00:07:31

Recently Reported IPs

157.113.194.18 81.169.207.123 189.249.0.150 81.150.52.102
210.228.238.13 180.220.28.20 14.185.143.169 38.181.54.157
200.155.175.197 189.213.139.221 105.244.3.141 203.228.234.242
213.249.163.4 166.183.213.7 53.235.91.212 160.239.65.116
117.84.154.25 128.77.215.201 220.114.192.124 150.88.13.127