Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.199.145.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42441
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.199.145.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 16:37:21 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 145.145.199.39.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.145.199.39.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.75.202.218 attack
detected by Fail2Ban
2020-03-25 02:20:49
190.146.184.215 attackspam
Mar 24 18:20:54 game-panel sshd[18201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.146.184.215
Mar 24 18:20:56 game-panel sshd[18201]: Failed password for invalid user dedrick from 190.146.184.215 port 54142 ssh2
Mar 24 18:25:11 game-panel sshd[18358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.146.184.215
2020-03-25 02:25:16
139.199.6.107 attack
2020-03-24T18:26:51.158092abusebot-4.cloudsearch.cf sshd[22574]: Invalid user node from 139.199.6.107 port 39692
2020-03-24T18:26:51.165540abusebot-4.cloudsearch.cf sshd[22574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.6.107
2020-03-24T18:26:51.158092abusebot-4.cloudsearch.cf sshd[22574]: Invalid user node from 139.199.6.107 port 39692
2020-03-24T18:26:52.743376abusebot-4.cloudsearch.cf sshd[22574]: Failed password for invalid user node from 139.199.6.107 port 39692 ssh2
2020-03-24T18:31:48.950254abusebot-4.cloudsearch.cf sshd[22831]: Invalid user lizhipeng from 139.199.6.107 port 41383
2020-03-24T18:31:48.958327abusebot-4.cloudsearch.cf sshd[22831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.6.107
2020-03-24T18:31:48.950254abusebot-4.cloudsearch.cf sshd[22831]: Invalid user lizhipeng from 139.199.6.107 port 41383
2020-03-24T18:31:50.641584abusebot-4.cloudsearch.cf sshd[22831]: F
...
2020-03-25 02:59:24
46.218.85.122 attackspam
Mar 24 14:31:57 mail sshd\[42326\]: Invalid user daniel from 46.218.85.122
Mar 24 14:31:57 mail sshd\[42326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.85.122
...
2020-03-25 02:53:16
192.144.164.229 attack
2020-03-24T19:28:34.552306v22018076590370373 sshd[11069]: Invalid user zengfl from 192.144.164.229 port 42000
2020-03-24T19:28:34.558197v22018076590370373 sshd[11069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.164.229
2020-03-24T19:28:34.552306v22018076590370373 sshd[11069]: Invalid user zengfl from 192.144.164.229 port 42000
2020-03-24T19:28:36.607932v22018076590370373 sshd[11069]: Failed password for invalid user zengfl from 192.144.164.229 port 42000 ssh2
2020-03-24T19:32:16.541815v22018076590370373 sshd[21175]: Invalid user welox from 192.144.164.229 port 42302
...
2020-03-25 02:37:29
111.229.109.26 attack
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-03-25 02:33:10
67.205.177.0 attackspambots
Triggered by Fail2Ban at Ares web server
2020-03-25 02:38:17
190.103.181.215 attack
Mar 24 19:32:03 cloud sshd[5642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.103.181.215 
Mar 24 19:32:04 cloud sshd[5642]: Failed password for invalid user informix from 190.103.181.215 port 58880 ssh2
2020-03-25 02:46:26
183.178.39.73 attack
Unauthorized connection attempt from IP address 183.178.39.73 on Port 445(SMB)
2020-03-25 03:00:17
167.99.87.82 attackbotsspam
Mar 24 17:25:02 haigwepa sshd[24620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.87.82 
Mar 24 17:25:04 haigwepa sshd[24620]: Failed password for invalid user localadmin from 167.99.87.82 port 42282 ssh2
...
2020-03-25 02:30:09
49.234.87.24 attack
2020-03-24T19:26:54.585683vps751288.ovh.net sshd\[1946\]: Invalid user wilczewski from 49.234.87.24 port 40838
2020-03-24T19:26:54.593663vps751288.ovh.net sshd\[1946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.87.24
2020-03-24T19:26:56.583089vps751288.ovh.net sshd\[1946\]: Failed password for invalid user wilczewski from 49.234.87.24 port 40838 ssh2
2020-03-24T19:32:05.720131vps751288.ovh.net sshd\[1981\]: Invalid user jrkotrla from 49.234.87.24 port 47408
2020-03-24T19:32:05.731584vps751288.ovh.net sshd\[1981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.87.24
2020-03-25 02:46:09
121.46.27.218 attackbotsspam
SSH bruteforce
2020-03-25 02:25:31
133.130.119.178 attackspam
Mar 24 19:01:37 MainVPS sshd[3581]: Invalid user circ from 133.130.119.178 port 39513
Mar 24 19:01:37 MainVPS sshd[3581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.119.178
Mar 24 19:01:37 MainVPS sshd[3581]: Invalid user circ from 133.130.119.178 port 39513
Mar 24 19:01:38 MainVPS sshd[3581]: Failed password for invalid user circ from 133.130.119.178 port 39513 ssh2
Mar 24 19:09:56 MainVPS sshd[20640]: Invalid user nk from 133.130.119.178 port 27844
...
2020-03-25 02:26:37
54.36.87.176 attackspambots
Mar 24 18:41:27 sso sshd[6122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.87.176
Mar 24 18:41:29 sso sshd[6122]: Failed password for invalid user uk from 54.36.87.176 port 32962 ssh2
...
2020-03-25 02:25:59
222.186.175.23 attackspam
Mar 24 18:32:09 localhost sshd[90747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23  user=root
Mar 24 18:32:10 localhost sshd[90747]: Failed password for root from 222.186.175.23 port 23516 ssh2
Mar 24 18:32:12 localhost sshd[90747]: Failed password for root from 222.186.175.23 port 23516 ssh2
Mar 24 18:32:09 localhost sshd[90747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23  user=root
Mar 24 18:32:10 localhost sshd[90747]: Failed password for root from 222.186.175.23 port 23516 ssh2
Mar 24 18:32:12 localhost sshd[90747]: Failed password for root from 222.186.175.23 port 23516 ssh2
Mar 24 18:32:09 localhost sshd[90747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23  user=root
Mar 24 18:32:10 localhost sshd[90747]: Failed password for root from 222.186.175.23 port 23516 ssh2
Mar 24 18:32:12 localhost sshd[90747]: Fa
...
2020-03-25 02:38:39

Recently Reported IPs

160.236.109.63 116.150.140.47 226.32.171.80 74.31.80.62
225.221.26.127 79.18.165.224 215.65.135.204 239.48.97.31
230.158.149.139 33.223.190.5 187.135.203.57 187.168.248.188
39.28.111.128 123.229.246.87 118.30.52.153 160.22.36.53
144.35.243.209 98.8.22.57 213.122.203.53 241.244.121.114