Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.243.145.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57585
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.243.145.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 23:22:12 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 52.145.243.217.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.145.243.217.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.71.208.253 attackbots
Unauthorized connection attempt detected from IP address 45.71.208.253 to port 2220 [J]
2020-01-06 07:49:06
60.190.114.82 attackbots
Unauthorized connection attempt detected from IP address 60.190.114.82 to port 2220 [J]
2020-01-06 07:26:46
222.186.15.31 attackspam
Jan  5 23:15:17 ip-172-31-62-245 sshd\[20529\]: Failed password for root from 222.186.15.31 port 38080 ssh2\
Jan  5 23:15:19 ip-172-31-62-245 sshd\[20529\]: Failed password for root from 222.186.15.31 port 38080 ssh2\
Jan  5 23:15:22 ip-172-31-62-245 sshd\[20529\]: Failed password for root from 222.186.15.31 port 38080 ssh2\
Jan  5 23:24:31 ip-172-31-62-245 sshd\[20707\]: Failed password for root from 222.186.15.31 port 40367 ssh2\
Jan  5 23:24:33 ip-172-31-62-245 sshd\[20707\]: Failed password for root from 222.186.15.31 port 40367 ssh2\
2020-01-06 07:25:54
61.236.231.59 attack
Unauthorized connection attempt detected from IP address 61.236.231.59 to port 2323 [J]
2020-01-06 07:47:46
114.25.119.168 attackspam
Honeypot attack, port: 23, PTR: 114-25-119-168.dynamic-ip.hinet.net.
2020-01-06 07:24:14
221.193.221.164 attack
Jan  6 00:34:29 host postfix/smtpd[20859]: warning: unknown[221.193.221.164]: SASL LOGIN authentication failed: authentication failure
Jan  6 00:34:31 host postfix/smtpd[20859]: warning: unknown[221.193.221.164]: SASL LOGIN authentication failed: authentication failure
...
2020-01-06 07:42:54
106.12.6.54 attackspam
Unauthorized connection attempt detected from IP address 106.12.6.54 to port 2220 [J]
2020-01-06 07:41:39
80.82.77.245 attackspam
80.82.77.245 was recorded 16 times by 7 hosts attempting to connect to the following ports: 515,631,997. Incident counter (4h, 24h, all-time): 16, 90, 16964
2020-01-06 07:12:30
218.92.0.145 attack
Jan  5 20:35:38 firewall sshd[10148]: Failed password for root from 218.92.0.145 port 46595 ssh2
Jan  5 20:35:41 firewall sshd[10148]: Failed password for root from 218.92.0.145 port 46595 ssh2
Jan  5 20:35:45 firewall sshd[10148]: Failed password for root from 218.92.0.145 port 46595 ssh2
...
2020-01-06 07:37:28
36.6.57.220 attackspambots
2020-01-05 15:49:56 H=(ylmf-pc) [36.6.57.220]:50604 I=[192.147.25.65]:25 rejected EHLO or HELO ylmf-pc: CHECK_HELO: ylmf-pc
2020-01-05 15:49:56 H=(ylmf-pc) [36.6.57.220]:53723 I=[192.147.25.65]:25 rejected EHLO or HELO ylmf-pc: CHECK_HELO: ylmf-pc
2020-01-05 15:49:57 H=(ylmf-pc) [36.6.57.220]:58034 I=[192.147.25.65]:25 rejected EHLO or HELO ylmf-pc: CHECK_HELO: ylmf-pc
2020-01-05 15:49:57 H=(ylmf-pc) [36.6.57.220]:53530 I=[192.147.25.65]:25 rejected EHLO or HELO ylmf-pc: CHECK_HELO: ylmf-pc
...
2020-01-06 07:20:08
123.126.20.90 attack
Unauthorized connection attempt detected from IP address 123.126.20.90 to port 2220 [J]
2020-01-06 07:41:14
112.170.216.109 attack
Jan  5 22:49:42 ns381471 sshd[6100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.170.216.109
Jan  5 22:49:44 ns381471 sshd[6100]: Failed password for invalid user admin from 112.170.216.109 port 48958 ssh2
2020-01-06 07:30:35
114.202.139.173 attack
Unauthorized connection attempt detected from IP address 114.202.139.173 to port 2220 [J]
2020-01-06 07:43:38
46.190.25.18 attack
Honeypot attack, port: 23, PTR: adsl-18.46.190.25.tellas.gr.
2020-01-06 07:19:03
218.92.0.138 attackbotsspam
Jan  6 00:21:27 MK-Soft-Root2 sshd[7192]: Failed password for root from 218.92.0.138 port 54862 ssh2
Jan  6 00:21:31 MK-Soft-Root2 sshd[7192]: Failed password for root from 218.92.0.138 port 54862 ssh2
...
2020-01-06 07:23:33

Recently Reported IPs

206.90.245.193 101.236.200.45 43.204.1.237 225.229.59.132
38.80.190.244 43.164.47.200 70.105.31.66 194.124.221.38
176.192.41.220 74.69.222.108 230.173.191.226 71.153.0.249
6.98.26.61 73.126.100.120 93.58.63.120 205.72.72.167
83.9.88.4 81.237.152.20 200.243.135.25 244.189.83.137