Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.39.105.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.39.105.58.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 06:01:12 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 58.105.39.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 58.105.39.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
125.213.150.6 attackspambots
Dec 15 02:07:50 linuxvps sshd\[7888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.213.150.6  user=root
Dec 15 02:07:52 linuxvps sshd\[7888\]: Failed password for root from 125.213.150.6 port 12998 ssh2
Dec 15 02:15:14 linuxvps sshd\[12997\]: Invalid user mysql from 125.213.150.6
Dec 15 02:15:14 linuxvps sshd\[12997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.213.150.6
Dec 15 02:15:16 linuxvps sshd\[12997\]: Failed password for invalid user mysql from 125.213.150.6 port 19956 ssh2
2019-12-15 15:35:57
139.59.41.170 attackbots
Dec 14 21:18:07 hpm sshd\[27067\]: Invalid user jacline from 139.59.41.170
Dec 14 21:18:07 hpm sshd\[27067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.170
Dec 14 21:18:10 hpm sshd\[27067\]: Failed password for invalid user jacline from 139.59.41.170 port 37552 ssh2
Dec 14 21:24:11 hpm sshd\[27616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.170  user=mail
Dec 14 21:24:14 hpm sshd\[27616\]: Failed password for mail from 139.59.41.170 port 45832 ssh2
2019-12-15 15:34:32
173.249.44.162 attack
TCP Port Scanning
2019-12-15 15:08:08
222.186.180.9 attackbotsspam
Dec 15 06:49:45 localhost sshd\[96007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
Dec 15 06:49:47 localhost sshd\[96007\]: Failed password for root from 222.186.180.9 port 48258 ssh2
Dec 15 06:49:51 localhost sshd\[96007\]: Failed password for root from 222.186.180.9 port 48258 ssh2
Dec 15 06:49:54 localhost sshd\[96007\]: Failed password for root from 222.186.180.9 port 48258 ssh2
Dec 15 06:49:57 localhost sshd\[96007\]: Failed password for root from 222.186.180.9 port 48258 ssh2
...
2019-12-15 15:01:13
171.22.25.50 attackbots
Dec 15 07:24:06 vps58358 sshd\[9099\]: Invalid user threadgill from 171.22.25.50Dec 15 07:24:09 vps58358 sshd\[9099\]: Failed password for invalid user threadgill from 171.22.25.50 port 59202 ssh2Dec 15 07:30:27 vps58358 sshd\[9195\]: Invalid user forums from 171.22.25.50Dec 15 07:30:29 vps58358 sshd\[9195\]: Failed password for invalid user forums from 171.22.25.50 port 55696 ssh2Dec 15 07:30:52 vps58358 sshd\[9199\]: Invalid user santhosh from 171.22.25.50Dec 15 07:30:54 vps58358 sshd\[9199\]: Failed password for invalid user santhosh from 171.22.25.50 port 58108 ssh2
...
2019-12-15 15:09:25
187.16.96.37 attackbotsspam
Dec 15 07:23:48 localhost sshd\[3854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.16.96.37  user=root
Dec 15 07:23:50 localhost sshd\[3854\]: Failed password for root from 187.16.96.37 port 57334 ssh2
Dec 15 07:30:07 localhost sshd\[4262\]: Invalid user jager from 187.16.96.37
Dec 15 07:30:07 localhost sshd\[4262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.16.96.37
Dec 15 07:30:09 localhost sshd\[4262\]: Failed password for invalid user jager from 187.16.96.37 port 35804 ssh2
...
2019-12-15 15:05:33
222.186.180.147 attackbots
Dec 15 01:59:28 mail sshd\[44941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
...
2019-12-15 15:00:50
198.245.49.37 attackspambots
Invalid user chago from 198.245.49.37 port 52406
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.49.37
Failed password for invalid user chago from 198.245.49.37 port 52406 ssh2
Invalid user zuan from 198.245.49.37 port 60426
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.49.37
2019-12-15 15:04:03
106.13.67.90 attackbots
Dec 15 07:46:37 lnxmail61 sshd[22859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.67.90
Dec 15 07:46:37 lnxmail61 sshd[22859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.67.90
2019-12-15 14:55:48
123.126.34.54 attackspam
Dec 15 09:20:35 hosting sshd[9900]: Invalid user uucp from 123.126.34.54 port 51475
Dec 15 09:20:35 hosting sshd[9900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.126.34.54
Dec 15 09:20:35 hosting sshd[9900]: Invalid user uucp from 123.126.34.54 port 51475
Dec 15 09:20:38 hosting sshd[9900]: Failed password for invalid user uucp from 123.126.34.54 port 51475 ssh2
Dec 15 09:30:06 hosting sshd[10563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.126.34.54  user=games
Dec 15 09:30:08 hosting sshd[10563]: Failed password for games from 123.126.34.54 port 58765 ssh2
...
2019-12-15 15:14:41
36.155.113.199 attackbots
Dec 15 07:11:16 zeus sshd[25612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.113.199 
Dec 15 07:11:18 zeus sshd[25612]: Failed password for invalid user ye from 36.155.113.199 port 40897 ssh2
Dec 15 07:18:10 zeus sshd[25804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.113.199 
Dec 15 07:18:12 zeus sshd[25804]: Failed password for invalid user server from 36.155.113.199 port 35196 ssh2
2019-12-15 15:30:47
62.24.109.31 attackbots
Telnet Server BruteForce Attack
2019-12-15 15:32:56
149.56.20.183 attackspambots
Jun  5 17:04:19 vtv3 sshd[25741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.20.183
Jun  5 17:16:36 vtv3 sshd[31752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.20.183  user=nobody
Jun  5 17:16:37 vtv3 sshd[31752]: Failed password for nobody from 149.56.20.183 port 55336 ssh2
Jun  5 17:19:23 vtv3 sshd[333]: Invalid user vradu from 149.56.20.183 port 50514
Jun  5 17:19:23 vtv3 sshd[333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.20.183
Jun  5 17:19:26 vtv3 sshd[333]: Failed password for invalid user vradu from 149.56.20.183 port 50514 ssh2
Jun  5 17:29:42 vtv3 sshd[5774]: Invalid user mellisa from 149.56.20.183 port 57478
Jun  5 17:29:42 vtv3 sshd[5774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.20.183
Jun  5 17:29:44 vtv3 sshd[5774]: Failed password for invalid user mellisa from 149.56.20.183 port 57478
2019-12-15 15:11:31
213.194.162.226 attackbotsspam
port scan and connect, tcp 81 (hosts2-ns)
2019-12-15 15:26:52
163.172.36.146 attack
none
2019-12-15 15:29:41

Recently Reported IPs

167.107.147.32 166.207.81.132 184.223.201.121 148.158.246.153
48.206.239.89 211.31.56.4 143.157.139.17 132.169.63.223
79.218.109.235 208.103.69.188 74.30.154.141 38.132.247.90
3.133.231.45 192.211.103.196 147.82.96.191 202.117.141.190
64.1.191.191 89.169.84.3 53.84.231.101 157.55.192.235