Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.145.152.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37182
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.145.152.192.		IN	A

;; AUTHORITY SECTION:
.			503	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 04:08:50 CST 2022
;; MSG SIZE  rcvd: 108
Host info
192.152.145.220.in-addr.arpa domain name pointer nttkyo880192.tkyo.nt.ngn.ppp.infoweb.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
192.152.145.220.in-addr.arpa	name = nttkyo880192.tkyo.nt.ngn.ppp.infoweb.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
58.153.243.217 attackspambots
5555/tcp
[2020-01-09]1pkt
2020-01-09 13:45:08
109.117.222.197 attack
unauthorized connection attempt
2020-01-09 13:24:49
189.169.191.72 attackbotsspam
unauthorized connection attempt
2020-01-09 13:51:03
175.204.114.196 attackbotsspam
unauthorized connection attempt
2020-01-09 13:35:25
103.85.233.138 attackspam
unauthorized connection attempt
2020-01-09 13:40:08
85.187.5.44 attackspambots
unauthorized connection attempt
2020-01-09 13:41:14
175.21.7.190 attackbotsspam
unauthorized connection attempt
2020-01-09 13:53:27
122.117.98.133 attack
unauthorized connection attempt
2020-01-09 13:36:42
112.85.42.172 attackspam
Jan  9 01:49:56 server sshd\[19561\]: Failed password for root from 112.85.42.172 port 51157 ssh2
Jan  9 08:49:17 server sshd\[23034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172  user=root
Jan  9 08:49:19 server sshd\[23034\]: Failed password for root from 112.85.42.172 port 54449 ssh2
Jan  9 08:49:22 server sshd\[23034\]: Failed password for root from 112.85.42.172 port 54449 ssh2
Jan  9 08:49:26 server sshd\[23034\]: Failed password for root from 112.85.42.172 port 54449 ssh2
...
2020-01-09 13:56:40
183.83.175.252 attackspam
unauthorized connection attempt
2020-01-09 13:33:18
109.162.158.161 attack
unauthorized connection attempt
2020-01-09 13:38:53
87.1.178.249 attack
unauthorized connection attempt
2020-01-09 13:25:50
201.156.6.216 attackspam
unauthorized connection attempt
2020-01-09 13:30:31
113.161.79.144 attackbots
unauthorized connection attempt
2020-01-09 13:17:28
83.174.198.233 attackspam
unauthorized connection attempt
2020-01-09 13:42:40

Recently Reported IPs

2.134.130.155 221.226.126.77 121.22.234.184 223.159.77.188
139.205.10.80 118.197.179.103 177.146.228.180 247.254.199.142
13.18.215.15 161.33.42.240 62.226.54.146 175.198.192.56
103.128.148.115 77.90.66.187 174.24.73.24 112.40.161.26
170.113.127.35 16.48.158.210 145.204.80.63 49.50.21.217