Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kyrgyzstan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
213.145.136.20 attackbots
Unauthorized connection attempt detected from IP address 213.145.136.20 to port 5900
2020-06-23 02:31:38
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.145.136.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38186
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.145.136.14.			IN	A

;; AUTHORITY SECTION:
.			325	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 01:07:26 CST 2022
;; MSG SIZE  rcvd: 107
Host info
14.136.145.213.in-addr.arpa domain name pointer 213-145-136-14.static.ktnet.kg.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.136.145.213.in-addr.arpa	name = 213-145-136-14.static.ktnet.kg.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.228.100.238 attack
SSH login attempts
2019-12-14 01:59:07
45.95.33.118 attackspambots
Autoban   45.95.33.118 AUTH/CONNECT
2019-12-14 01:57:59
34.240.3.65 attack
IP: 34.240.3.65
ASN: AS16509 Amazon.com Inc.
Port: Message Submission 587
Found in one or more Blacklists
Date: 13/12/2019 5:14:05 PM UTC
2019-12-14 01:28:57
74.208.230.197 attackspam
Dec 13 18:23:03 lnxmysql61 sshd[28932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.230.197
2019-12-14 01:52:28
159.89.194.160 attack
fraudulent SSH attempt
2019-12-14 01:23:24
124.122.156.68 attack
IP: 124.122.156.68
ASN: AS17552 True Internet Co. Ltd.
Port: Message Submission 587
Found in one or more Blacklists
Date: 13/12/2019 5:29:05 PM UTC
2019-12-14 01:29:55
185.156.73.52 attackbots
12/13/2019-12:47:52.339803 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-14 01:50:25
220.110.164.66 attack
firewall-block, port(s): 445/tcp
2019-12-14 01:36:37
179.43.147.220 attackbotsspam
CloudCIX Reconnaissance Scan Detected, PTR: 60yx.rockbanget.com.
2019-12-14 01:55:00
84.215.22.70 attackspambots
Dec 13 07:23:32 eddieflores sshd\[1320\]: Invalid user micah from 84.215.22.70
Dec 13 07:23:32 eddieflores sshd\[1320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cm-84.215.22.70.getinternet.no
Dec 13 07:23:34 eddieflores sshd\[1320\]: Failed password for invalid user micah from 84.215.22.70 port 33364 ssh2
Dec 13 07:30:14 eddieflores sshd\[1932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cm-84.215.22.70.getinternet.no  user=root
Dec 13 07:30:16 eddieflores sshd\[1932\]: Failed password for root from 84.215.22.70 port 45720 ssh2
2019-12-14 01:36:26
117.83.54.197 attackspambots
Dec 13 09:59:02 mailman postfix/smtpd[17950]: warning: unknown[117.83.54.197]: SASL LOGIN authentication failed: authentication failure
2019-12-14 01:25:08
27.54.163.10 attack
445/tcp
[2019-12-13]1pkt
2019-12-14 01:29:29
5.135.121.238 attackspam
Invalid user hardware from 5.135.121.238 port 49106
2019-12-14 01:55:32
188.166.7.108 attackspambots
Dec 13 18:15:35 lnxweb62 sshd[10693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.7.108
2019-12-14 01:39:10
194.87.214.145 attackproxy
Used together with a subnet 194.67.192.0/19 to DDOS attack other computers.
2019-12-14 01:49:00

Recently Reported IPs

5.62.24.13 106.118.185.192 27.5.30.122 125.25.92.111
121.133.25.246 88.250.11.21 83.234.218.30 202.142.68.51
34.91.159.81 27.38.193.194 119.199.118.89 99.238.166.167
79.166.62.139 72.221.196.145 172.21.0.1 3.110.81.200
191.240.114.177 176.44.68.99 200.90.122.60 182.215.142.220