Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.145.145.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.145.145.155.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022702 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 04:30:01 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'Host 155.145.145.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 214.145.145.155.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
206.189.87.102 attackspambots
Invalid user ubuntu from 206.189.87.102 port 36502
2019-09-13 11:45:36
54.37.155.165 attackspambots
Invalid user odoo from 54.37.155.165 port 47612
2019-09-13 12:02:40
65.181.121.246 attackbotsspam
Invalid user zte from 65.181.121.246 port 45496
2019-09-13 12:01:36
1.179.137.10 attackbotsspam
Invalid user server from 1.179.137.10 port 57917
2019-09-13 11:41:55
118.24.111.239 attackspam
Invalid user demo3 from 118.24.111.239 port 45332
2019-09-13 11:55:03
188.165.242.200 attackbotsspam
Sep 13 07:10:53 www sshd\[40146\]: Invalid user rasa from 188.165.242.200
Sep 13 07:10:54 www sshd\[40146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.242.200
Sep 13 07:10:55 www sshd\[40146\]: Failed password for invalid user rasa from 188.165.242.200 port 34394 ssh2
...
2019-09-13 12:15:47
23.129.64.204 attackbotsspam
Invalid user zte from 23.129.64.204 port 37587
2019-09-13 12:08:28
50.99.193.144 attackbotsspam
2019-08-15T14:21:25.878140wiz-ks3 sshd[9259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=d50-99-193-144.abhsia.telus.net  user=root
2019-08-15T14:21:27.620771wiz-ks3 sshd[9259]: Failed password for root from 50.99.193.144 port 53752 ssh2
2019-08-15T14:21:30.424652wiz-ks3 sshd[9259]: Failed password for root from 50.99.193.144 port 53752 ssh2
2019-08-15T14:21:25.878140wiz-ks3 sshd[9259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=d50-99-193-144.abhsia.telus.net  user=root
2019-08-15T14:21:27.620771wiz-ks3 sshd[9259]: Failed password for root from 50.99.193.144 port 53752 ssh2
2019-08-15T14:21:30.424652wiz-ks3 sshd[9259]: Failed password for root from 50.99.193.144 port 53752 ssh2
2019-08-15T14:21:25.878140wiz-ks3 sshd[9259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=d50-99-193-144.abhsia.telus.net  user=root
2019-08-15T14:21:27.620771wiz-ks3 sshd[9259]: Failed password for roo
2019-09-13 12:04:05
205.185.125.82 attackbots
Invalid user admin from 205.185.125.82 port 40754
2019-09-13 12:10:56
187.201.24.14 attackspam
F2B jail: sshd. Time: 2019-09-13 06:14:35, Reported by: VKReport
2019-09-13 12:16:20
171.244.36.103 attackbots
Invalid user ubuntu from 171.244.36.103 port 45426
2019-09-13 12:18:48
117.30.119.142 attack
Invalid user admin from 117.30.119.142 port 55401
2019-09-13 11:55:23
111.29.27.97 attack
Invalid user test from 111.29.27.97 port 35096
2019-09-13 11:55:40
162.247.74.213 attackbots
Invalid user zte from 162.247.74.213 port 42038
2019-09-13 11:51:48
23.129.64.200 attackspam
2019-08-15T13:58:48.893968wiz-ks3 sshd[9016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.emeraldonion.org  user=root
2019-08-15T13:58:51.013762wiz-ks3 sshd[9016]: Failed password for root from 23.129.64.200 port 26863 ssh2
2019-08-15T13:58:54.710403wiz-ks3 sshd[9016]: Failed password for root from 23.129.64.200 port 26863 ssh2
2019-08-15T13:58:48.893968wiz-ks3 sshd[9016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.emeraldonion.org  user=root
2019-08-15T13:58:51.013762wiz-ks3 sshd[9016]: Failed password for root from 23.129.64.200 port 26863 ssh2
2019-08-15T13:58:54.710403wiz-ks3 sshd[9016]: Failed password for root from 23.129.64.200 port 26863 ssh2
2019-08-15T13:58:48.893968wiz-ks3 sshd[9016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.emeraldonion.org  user=root
2019-08-15T13:58:51.013762wiz-ks3 sshd[9016]: Failed password for root from 23.129.64.200 port 26863 s
2019-09-13 11:38:33

Recently Reported IPs

80.75.179.219 13.13.4.161 193.62.216.179 124.14.138.195
25.102.29.232 70.75.14.4 148.124.76.114 116.102.157.18
52.250.10.231 40.55.94.190 44.191.170.67 45.17.106.248
177.206.234.183 48.7.172.159 166.59.214.19 151.61.183.148
214.221.149.46 43.206.40.96 169.100.107.191 176.138.164.120