Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seattle

Region: Washington

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.145.163.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23904
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;3.145.163.21.			IN	A

;; AUTHORITY SECTION:
.			433	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101200 1800 900 604800 86400

;; Query time: 499 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 13 03:04:14 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 21.163.145.3.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.163.145.3.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.188 attack
Mar  6 11:14:07 hosting sshd[459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.188  user=root
Mar  6 11:14:09 hosting sshd[459]: Failed password for root from 112.85.42.188 port 38265 ssh2
...
2020-03-06 18:53:18
222.186.175.216 attack
Mar  6 11:59:49 Ubuntu-1404-trusty-64-minimal sshd\[1626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Mar  6 11:59:50 Ubuntu-1404-trusty-64-minimal sshd\[1626\]: Failed password for root from 222.186.175.216 port 45454 ssh2
Mar  6 12:00:03 Ubuntu-1404-trusty-64-minimal sshd\[1626\]: Failed password for root from 222.186.175.216 port 45454 ssh2
Mar  6 12:00:06 Ubuntu-1404-trusty-64-minimal sshd\[3134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Mar  6 12:00:08 Ubuntu-1404-trusty-64-minimal sshd\[3134\]: Failed password for root from 222.186.175.216 port 49318 ssh2
2020-03-06 19:03:24
128.72.174.99 attackspambots
Mar  6 06:49:51 server2 sshd\[6021\]: User root from 128-72-174-99.broadband.corbina.ru not allowed because not listed in AllowUsers
Mar  6 06:50:00 server2 sshd\[6027\]: User root from 128-72-174-99.broadband.corbina.ru not allowed because not listed in AllowUsers
Mar  6 06:50:10 server2 sshd\[6029\]: User root from 128-72-174-99.broadband.corbina.ru not allowed because not listed in AllowUsers
Mar  6 06:50:19 server2 sshd\[6211\]: Invalid user admin from 128.72.174.99
Mar  6 06:50:28 server2 sshd\[6217\]: Invalid user admin from 128.72.174.99
Mar  6 06:50:33 server2 sshd\[6228\]: Invalid user admin from 128.72.174.99
2020-03-06 19:11:09
69.94.134.193 attackspam
Email Subject: 'Tragödien durch Lichteffekten – Schütze deine Augen am Lenkrad auf neue Weise'
2020-03-06 18:45:40
202.79.56.186 attackspam
202.79.56.186 - - [06/Mar/2020:09:53:16 +0000] "POST /wp-login.php HTTP/1.1" 200 6409 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
202.79.56.186 - - [06/Mar/2020:09:53:17 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-03-06 19:20:46
197.45.107.54 attack
firewall-block, port(s): 445/tcp
2020-03-06 19:19:51
45.79.226.22 attackbotsspam
Mar  6 10:24:17 lnxded64 sshd[30077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.79.226.22
Mar  6 10:24:18 lnxded64 sshd[30077]: Failed password for invalid user saned from 45.79.226.22 port 38380 ssh2
Mar  6 10:29:47 lnxded64 sshd[31281]: Failed password for root from 45.79.226.22 port 57358 ssh2
2020-03-06 19:09:24
89.34.27.149 attack
Automatic report - XMLRPC Attack
2020-03-06 19:02:26
61.220.251.205 attackbotsspam
TW_MAINT-TW-TWNIC_<177>1583470235 [1:2403402:55758] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 52 [Classification: Misc Attack] [Priority: 2] {TCP} 61.220.251.205:44806
2020-03-06 19:10:54
41.218.214.89 attack
Mar  6 05:50:27 v22019058497090703 sshd[20160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.218.214.89
Mar  6 05:50:29 v22019058497090703 sshd[20160]: Failed password for invalid user admin from 41.218.214.89 port 49796 ssh2
...
2020-03-06 19:13:55
137.74.172.1 attack
Mar  6 16:00:12 itv-usvr-01 sshd[23671]: Invalid user invite from 137.74.172.1
Mar  6 16:00:12 itv-usvr-01 sshd[23671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.172.1
Mar  6 16:00:12 itv-usvr-01 sshd[23671]: Invalid user invite from 137.74.172.1
Mar  6 16:00:13 itv-usvr-01 sshd[23671]: Failed password for invalid user invite from 137.74.172.1 port 42144 ssh2
Mar  6 16:06:46 itv-usvr-01 sshd[23931]: Invalid user ts from 137.74.172.1
2020-03-06 18:58:32
69.94.158.122 attack
Mar  6 06:28:33 web01.agentur-b-2.de postfix/smtpd[513973]: NOQUEUE: reject: RCPT from wandering.swingthelamp.com[69.94.158.122]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Mar  6 06:28:33 web01.agentur-b-2.de postfix/smtpd[513972]: NOQUEUE: reject: RCPT from wandering.swingthelamp.com[69.94.158.122]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Mar  6 06:28:33 web01.agentur-b-2.de postfix/smtpd[522677]: NOQUEUE: reject: RCPT from wandering.swingthelamp.com[69.94.158.122]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Mar  6 06:28:33 web01.agentur-b-2.de postfix/smtpd[519660]: NOQUEUE: reject: RCPT from wandering.swin
2020-03-06 18:44:29
116.92.208.100 attackspam
fail2ban
2020-03-06 19:08:39
137.74.53.155 attack
Mar  6 08:37:00 server sshd\[3565\]: Invalid user oracle from 137.74.53.155
Mar  6 08:37:00 server sshd\[3565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.53.155 
Mar  6 08:37:02 server sshd\[3565\]: Failed password for invalid user oracle from 137.74.53.155 port 34313 ssh2
Mar  6 09:56:57 server sshd\[17405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.53.155  user=root
Mar  6 09:57:00 server sshd\[17405\]: Failed password for root from 137.74.53.155 port 34313 ssh2
...
2020-03-06 19:16:48
192.241.228.48 attackspam
1583490052 - 03/06/2020 11:20:52 Host: 192.241.228.48/192.241.228.48 Port: 110 TCP Blocked
2020-03-06 19:06:52

Recently Reported IPs

202.169.223.204 174.126.210.8 75.179.31.49 111.127.115.161
210.52.145.26 36.224.55.17 221.216.211.242 110.139.222.130
115.138.178.125 198.23.101.30 187.123.57.122 24.138.141.132
87.231.188.199 223.89.188.8 158.69.117.126 190.210.142.45
142.114.28.202 96.92.3.51 106.166.120.255 3.20.31.21