Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.34.202.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54370
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.34.202.136.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011100 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 00:09:25 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 136.202.34.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.202.34.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.68.165.173 attack
Unauthorized connection attempt from IP address 118.68.165.173 on Port 445(SMB)
2019-12-13 20:53:20
190.83.140.54 attackspam
DATE:2019-12-13 08:44:25, IP:190.83.140.54, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-12-13 20:35:35
78.11.53.59 attack
Dec 13 11:37:13 server sshd\[15886\]: Invalid user lisa from 78.11.53.59
Dec 13 11:37:13 server sshd\[15886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78-11-53-59.static.ip.netia.com.pl 
Dec 13 11:37:15 server sshd\[15886\]: Failed password for invalid user lisa from 78.11.53.59 port 33826 ssh2
Dec 13 11:37:57 server sshd\[16039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78-11-53-59.static.ip.netia.com.pl  user=root
Dec 13 11:37:58 server sshd\[16039\]: Failed password for root from 78.11.53.59 port 60950 ssh2
...
2019-12-13 20:31:46
106.53.19.186 attackbots
Dec 13 10:44:10 hosting sshd[2922]: Invalid user roller from 106.53.19.186 port 39607
...
2019-12-13 20:48:28
101.51.177.4 attack
1576223066 - 12/13/2019 08:44:26 Host: 101.51.177.4/101.51.177.4 Port: 445 TCP Blocked
2019-12-13 20:33:22
45.119.215.68 attack
Dec 13 05:21:40 linuxvps sshd\[5677\]: Invalid user focas from 45.119.215.68
Dec 13 05:21:40 linuxvps sshd\[5677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.215.68
Dec 13 05:21:42 linuxvps sshd\[5677\]: Failed password for invalid user focas from 45.119.215.68 port 59708 ssh2
Dec 13 05:29:07 linuxvps sshd\[9955\]: Invalid user netlogon from 45.119.215.68
Dec 13 05:29:07 linuxvps sshd\[9955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.215.68
2019-12-13 20:55:03
120.70.101.103 attackbots
Dec 13 09:37:18 ns382633 sshd\[19860\]: Invalid user squid from 120.70.101.103 port 48226
Dec 13 09:37:18 ns382633 sshd\[19860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.101.103
Dec 13 09:37:19 ns382633 sshd\[19860\]: Failed password for invalid user squid from 120.70.101.103 port 48226 ssh2
Dec 13 09:54:00 ns382633 sshd\[22750\]: Invalid user ching from 120.70.101.103 port 42423
Dec 13 09:54:00 ns382633 sshd\[22750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.101.103
2019-12-13 20:36:08
188.143.119.24 attack
Scanning
2019-12-13 20:47:10
118.70.132.57 attackspambots
Unauthorized connection attempt detected from IP address 118.70.132.57 to port 445
2019-12-13 20:38:04
104.236.38.105 attackbots
Dec 13 02:28:37 kapalua sshd\[19508\]: Invalid user southard from 104.236.38.105
Dec 13 02:28:38 kapalua sshd\[19508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.38.105
Dec 13 02:28:40 kapalua sshd\[19508\]: Failed password for invalid user southard from 104.236.38.105 port 55860 ssh2
Dec 13 02:33:59 kapalua sshd\[20055\]: Invalid user akiba from 104.236.38.105
Dec 13 02:33:59 kapalua sshd\[20055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.38.105
2019-12-13 20:36:27
182.73.55.92 attackbotsspam
Dec 13 13:39:55 mail sshd\[30137\]: Invalid user pinidc from 182.73.55.92
Dec 13 13:39:55 mail sshd\[30137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.55.92
Dec 13 13:39:56 mail sshd\[30137\]: Failed password for invalid user pinidc from 182.73.55.92 port 33768 ssh2
...
2019-12-13 20:44:13
222.186.175.181 attackspam
Dec 13 13:48:13 MK-Soft-VM7 sshd[21032]: Failed password for root from 222.186.175.181 port 41749 ssh2
Dec 13 13:48:16 MK-Soft-VM7 sshd[21032]: Failed password for root from 222.186.175.181 port 41749 ssh2
...
2019-12-13 20:58:16
172.81.238.222 attack
Dec 13 11:50:35 server sshd\[20127\]: Invalid user fialho from 172.81.238.222
Dec 13 11:50:35 server sshd\[20127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.238.222 
Dec 13 11:50:37 server sshd\[20127\]: Failed password for invalid user fialho from 172.81.238.222 port 42632 ssh2
Dec 13 12:08:55 server sshd\[25279\]: Invalid user aliah from 172.81.238.222
Dec 13 12:08:55 server sshd\[25279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.238.222 
...
2019-12-13 20:40:51
51.68.123.198 attackbots
SSH Brute Force, server-1 sshd[14842]: Failed password for invalid user george87 from 51.68.123.198 port 44060 ssh2
2019-12-13 21:03:07
83.27.142.158 attack
Dec 13 08:03:12 XXXXXX sshd[363]: Invalid user pi from 83.27.142.158 port 51578
2019-12-13 20:41:46

Recently Reported IPs

53.72.46.224 51.187.154.152 96.202.88.217 103.153.79.2
83.3.244.14 121.111.97.222 199.45.53.150 142.196.14.204
36.71.145.81 169.174.231.150 6.187.7.236 5.231.144.220
214.202.21.163 162.158.114.241 213.32.154.78 136.191.219.30
237.172.156.9 22.154.75.131 114.10.5.72 126.220.153.68