Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.145.212.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19444
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.145.212.130.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120701 1800 900 604800 86400

;; Query time: 215 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 08 03:30:57 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 130.212.145.44.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.212.145.44.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
212.83.145.12 attackspam
\[2019-07-10 00:25:36\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-10T00:25:36.386-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="999842011972592277524",SessionID="0x7f02f98e5508",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.145.12/61775",ACLName="no_extension_match"
\[2019-07-10 00:28:51\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-10T00:28:51.922-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="999843011972592277524",SessionID="0x7f02f8994028",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.145.12/56549",ACLName="no_extension_match"
\[2019-07-10 00:32:06\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-10T00:32:06.267-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="999844011972592277524",SessionID="0x7f02f98e5508",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.145.12/5
2019-07-10 12:41:15
134.209.64.10 attack
Jul 10 03:16:57 mail sshd\[30322\]: Invalid user mg from 134.209.64.10 port 39566
Jul 10 03:16:57 mail sshd\[30322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.64.10
Jul 10 03:16:59 mail sshd\[30322\]: Failed password for invalid user mg from 134.209.64.10 port 39566 ssh2
Jul 10 03:19:14 mail sshd\[30338\]: Invalid user ts3 from 134.209.64.10 port 38138
Jul 10 03:19:14 mail sshd\[30338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.64.10
...
2019-07-10 12:40:12
117.131.40.208 attackbotsspam
*Port Scan* detected from 117.131.40.208 (CN/China/-). 4 hits in the last 195 seconds
2019-07-10 12:38:18
154.221.17.109 attack
This IP address tries 792 time to get access to my web admin database using crawlers but get redirected
2019-07-10 12:59:17
27.109.17.18 attackspam
Jul 10 00:07:11 MK-Soft-VM4 sshd\[12950\]: Invalid user archiv from 27.109.17.18 port 33228
Jul 10 00:07:11 MK-Soft-VM4 sshd\[12950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.109.17.18
Jul 10 00:07:14 MK-Soft-VM4 sshd\[12950\]: Failed password for invalid user archiv from 27.109.17.18 port 33228 ssh2
...
2019-07-10 12:55:29
182.74.252.58 attackspam
Jul 10 05:38:20 bouncer sshd\[16254\]: Invalid user sou from 182.74.252.58 port 54654
Jul 10 05:38:20 bouncer sshd\[16254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.252.58 
Jul 10 05:38:23 bouncer sshd\[16254\]: Failed password for invalid user sou from 182.74.252.58 port 54654 ssh2
...
2019-07-10 12:52:26
139.59.29.153 attackspambots
ssh failed login
2019-07-10 12:34:19
198.245.63.94 attackbotsspam
Jul 10 05:46:31 server sshd[19158]: Failed password for invalid user lg from 198.245.63.94 port 38378 ssh2
Jul 10 06:06:45 server sshd[23122]: Failed password for invalid user ton from 198.245.63.94 port 49694 ssh2
Jul 10 06:08:16 server sshd[23507]: Failed password for invalid user 123456 from 198.245.63.94 port 38392 ssh2
2019-07-10 13:07:29
189.4.1.12 attackspambots
Jul 10 04:22:13 cp sshd[654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.4.1.12
Jul 10 04:22:15 cp sshd[654]: Failed password for invalid user test03 from 189.4.1.12 port 34984 ssh2
Jul 10 04:24:43 cp sshd[1820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.4.1.12
2019-07-10 12:31:00
222.186.15.217 attackspam
19/7/10@00:26:13: FAIL: Alarm-SSH address from=222.186.15.217
...
2019-07-10 12:43:39
178.128.27.125 attackbots
Jul  9 22:43:21 xb3 sshd[24527]: Failed password for invalid user admin from 178.128.27.125 port 39526 ssh2
Jul  9 22:43:22 xb3 sshd[24527]: Received disconnect from 178.128.27.125: 11: Bye Bye [preauth]
Jul  9 22:45:59 xb3 sshd[16712]: Failed password for invalid user amine from 178.128.27.125 port 37458 ssh2
Jul  9 22:46:00 xb3 sshd[16712]: Received disconnect from 178.128.27.125: 11: Bye Bye [preauth]
Jul  9 22:47:41 xb3 sshd[20223]: Failed password for invalid user test02 from 178.128.27.125 port 54538 ssh2
Jul  9 22:47:41 xb3 sshd[20223]: Received disconnect from 178.128.27.125: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=178.128.27.125
2019-07-10 12:35:28
190.73.114.102 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 19:56:50,741 INFO [shellcode_manager] (190.73.114.102) no match, writing hexdump (751c1ee47b283e83505ecb6df370fb92 :2199330) - MS17010 (EternalBlue)
2019-07-10 12:38:47
222.186.59.29 attack
2019-07-10T04:01:18.421711Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 222.186.59.29:3063 \(107.175.91.48:22\) \[session: 0deae58dee7a\]
2019-07-10T04:01:22.690958Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 222.186.59.29:2877 \(107.175.91.48:22\) \[session: 8bbea3023636\]
...
2019-07-10 12:55:57
82.221.128.73 attack
*Port Scan* detected from 82.221.128.73 (IS/Iceland/hiskeyprogram.com). 4 hits in the last 85 seconds
2019-07-10 12:32:40
213.32.252.112 attackbots
DATE:2019-07-10 01:24:05, IP:213.32.252.112, PORT:ssh brute force auth on SSH service (patata)
2019-07-10 13:04:09

Recently Reported IPs

167.220.214.148 27.194.169.141 21.231.238.164 239.197.20.62
191.51.28.31 99.114.192.144 34.170.168.106 21.126.112.135
76.82.184.54 50.147.168.42 141.71.54.160 131.160.196.8
193.75.247.247 40.24.138.13 66.0.113.69 181.186.2.56
214.55.174.14 251.221.78.66 55.56.70.150 92.239.255.30