Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bursa

Region: Bursa

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.144.214.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15418
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.144.214.4.			IN	A

;; AUTHORITY SECTION:
.			116	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024050800 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 08 18:35:04 CST 2024
;; MSG SIZE  rcvd: 105
Host info
4.214.144.45.in-addr.arpa domain name pointer host-4.hostingturkiye.com.tr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.214.144.45.in-addr.arpa	name = host-4.hostingturkiye.com.tr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.252.35.183 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-01 15:18:23
112.85.42.176 attackbotsspam
Sep  1 09:16:57 piServer sshd[12891]: Failed password for root from 112.85.42.176 port 58407 ssh2
Sep  1 09:17:01 piServer sshd[12891]: Failed password for root from 112.85.42.176 port 58407 ssh2
Sep  1 09:17:05 piServer sshd[12891]: Failed password for root from 112.85.42.176 port 58407 ssh2
Sep  1 09:17:09 piServer sshd[12891]: Failed password for root from 112.85.42.176 port 58407 ssh2
...
2020-09-01 15:24:17
51.79.84.48 attackbots
Sep  1 09:16:51 server sshd[22734]: Invalid user gis from 51.79.84.48 port 51528
...
2020-09-01 15:52:34
185.220.101.199 attackbotsspam
Sep  1 17:41:11 web1 sshd[32697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.199  user=root
Sep  1 17:41:13 web1 sshd[32697]: Failed password for root from 185.220.101.199 port 24244 ssh2
Sep  1 17:41:16 web1 sshd[32697]: Failed password for root from 185.220.101.199 port 24244 ssh2
Sep  1 17:41:11 web1 sshd[32697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.199  user=root
Sep  1 17:41:13 web1 sshd[32697]: Failed password for root from 185.220.101.199 port 24244 ssh2
Sep  1 17:41:16 web1 sshd[32697]: Failed password for root from 185.220.101.199 port 24244 ssh2
Sep  1 17:41:11 web1 sshd[32697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.199  user=root
Sep  1 17:41:13 web1 sshd[32697]: Failed password for root from 185.220.101.199 port 24244 ssh2
Sep  1 17:41:16 web1 sshd[32697]: Failed password for root from 185.220.1
...
2020-09-01 15:45:03
212.70.149.4 attackbotsspam
Unauthorized connection attempt detected from IP address 212.70.149.4 to port 25 [T]
2020-09-01 15:55:16
144.217.243.216 attack
Sep  1 09:34:50 server sshd[5669]: Invalid user klaus from 144.217.243.216 port 37648
...
2020-09-01 15:49:06
41.105.27.119 attackspam
41.105.27.119 - - \[01/Sep/2020:06:51:32 +0300\] "POST /xmlrpc.php HTTP/1.1" 200 428 "-" "Mozilla/5.0 \(Windows NT 6.1\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/59.0.3071.109 Safari/537.36" "-"
41.105.27.119 - - \[01/Sep/2020:06:51:35 +0300\] "POST /xmlrpc.php HTTP/1.1" 200 428 "-" "Mozilla/5.0 \(Windows NT 6.1\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/59.0.3071.109 Safari/537.36" "-"
...
2020-09-01 15:51:39
46.218.7.227 attackspam
Sep  1 07:54:15 server sshd[16990]: Invalid user aya from 46.218.7.227 port 43654
...
2020-09-01 15:14:18
184.82.47.71 attack
Icarus honeypot on github
2020-09-01 15:39:39
180.255.10.74 attack
Icarus honeypot on github
2020-09-01 15:50:27
136.243.72.5 attack
Sep  1 08:13:20 relay postfix/smtpd\[11894\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 08:13:20 relay postfix/smtpd\[11893\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 08:13:20 relay postfix/smtpd\[11933\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 08:13:20 relay postfix/smtpd\[11932\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 08:13:20 relay postfix/smtpd\[12260\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 08:13:20 relay postfix/smtpd\[11906\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 08:13:20 relay postfix/smtpd\[12337\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 08:13:20 relay postfix/smtpd\[12230\]: warning: 
...
2020-09-01 15:18:47
196.52.43.104 attackbots
Unauthorized connection attempt detected from IP address 196.52.43.104 to port 3389 [T]
2020-09-01 15:33:42
49.51.242.225 attackbots
port scan and connect, tcp 110 (pop3)
2020-09-01 15:27:11
139.162.122.110 attackbotsspam
Unauthorized connection attempt detected from IP address 139.162.122.110 to port 22 [T]
2020-09-01 15:13:04
192.241.229.109 attack
port scan and connect, tcp 27017 (mongodb)
2020-09-01 15:22:59

Recently Reported IPs

109.37.131.66 77.160.28.111 128.64.15.69 192.168.81.190
80.94.95.200 51.159.30.96 185.94.35.199 85.245.98.165
95.93.248.42 172.252.85.123 154.39.142.40 23.26.98.88
111.172.53.100 106.13.212.114 252.215.203.170 149.145.230.156
158.196.88.14 60.186.188.142 18.236.220.26 192.241.232.33