Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Weinan

Region: Shaanxi

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.145.194.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57103
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;219.145.194.117.		IN	A

;; AUTHORITY SECTION:
.			379	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090301 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 04 08:02:17 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 117.194.145.219.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 117.194.145.219.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
121.8.161.74 attackspambots
$f2bV_matches
2020-06-06 16:14:15
185.153.197.27 attackspambots
Port scanning [8 denied]
2020-06-06 16:01:48
185.176.27.54 attackbots
06/06/2020-02:42:34.984767 185.176.27.54 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-06 15:25:45
175.45.10.101 attackspambots
Jun  6 09:19:34 DAAP sshd[12991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.45.10.101  user=root
Jun  6 09:19:35 DAAP sshd[12991]: Failed password for root from 175.45.10.101 port 53396 ssh2
Jun  6 09:23:54 DAAP sshd[13046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.45.10.101  user=root
Jun  6 09:23:56 DAAP sshd[13046]: Failed password for root from 175.45.10.101 port 34454 ssh2
Jun  6 09:27:34 DAAP sshd[13097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.45.10.101  user=root
Jun  6 09:27:36 DAAP sshd[13097]: Failed password for root from 175.45.10.101 port 38790 ssh2
...
2020-06-06 16:16:37
79.147.25.174 attackspambots
Unauthorized connection attempt detected from IP address 79.147.25.174 to port 22
2020-06-06 16:12:51
185.153.196.2 attackbots
firewall-block, port(s): 40004/tcp
2020-06-06 16:02:51
185.151.242.186 attackbots
 TCP (SYN) 185.151.242.186:19882 -> port 23389, len 44
2020-06-06 16:05:13
112.85.42.174 attackspambots
Jun  6 09:11:07 minden010 sshd[29669]: Failed password for root from 112.85.42.174 port 47689 ssh2
Jun  6 09:11:11 minden010 sshd[29669]: Failed password for root from 112.85.42.174 port 47689 ssh2
Jun  6 09:11:20 minden010 sshd[29669]: Failed password for root from 112.85.42.174 port 47689 ssh2
Jun  6 09:11:20 minden010 sshd[29669]: error: maximum authentication attempts exceeded for root from 112.85.42.174 port 47689 ssh2 [preauth]
...
2020-06-06 15:26:32
94.228.207.1 attackbots
[portscan] Port scan
2020-06-06 15:56:27
190.205.103.12 attackbots
Invalid user minecraft from 190.205.103.12 port 48417
2020-06-06 15:35:04
37.49.226.249 attack
honeypot 22 port
2020-06-06 15:57:24
185.143.221.7 attackspambots
06/06/2020-03:46:32.402244 185.143.221.7 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-06 16:09:04
148.153.65.58 attackbotsspam
<6 unauthorized SSH connections
2020-06-06 15:33:33
121.233.206.209 attack
Unauthorized IMAP connection attempt
2020-06-06 15:49:40
185.176.27.210 attackspambots
[H1] Blocked by UFW
2020-06-06 15:32:09

Recently Reported IPs

115.248.86.253 185.118.162.233 27.231.52.134 75.62.178.68
203.106.138.84 15.156.56.210 129.16.110.179 117.69.154.5
111.131.255.62 82.106.11.4 190.61.38.228 174.157.157.42
67.158.6.30 117.228.174.43 82.89.163.118 65.209.57.187
66.140.84.159 68.97.24.250 66.244.91.126 71.168.129.225