Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.8.53.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64366
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;59.8.53.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 04:21:30 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 145.53.8.59.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.53.8.59.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
79.10.127.180 attackspambots
Unauthorized connection attempt detected from IP address 79.10.127.180 to port 81
2020-05-13 00:19:22
79.7.171.156 attackbots
port scan and connect, tcp 80 (http)
2020-05-13 00:58:22
186.233.208.57 attack
Unauthorized connection attempt detected from IP address 186.233.208.57 to port 80
2020-05-13 00:39:51
41.129.104.53 attack
Unauthorized connection attempt detected from IP address 41.129.104.53 to port 443
2020-05-13 00:27:02
58.71.24.194 attack
Unauthorized connection attempt detected from IP address 58.71.24.194 to port 81
2020-05-13 00:24:47
189.142.226.174 attack
Unauthorized connection attempt detected from IP address 189.142.226.174 to port 4567
2020-05-13 00:37:13
77.42.97.96 attackspam
Unauthorized connection attempt detected from IP address 77.42.97.96 to port 80
2020-05-13 00:20:17
129.28.165.178 attack
May 12 16:46:09 MainVPS sshd[22591]: Invalid user echo from 129.28.165.178 port 48512
May 12 16:46:09 MainVPS sshd[22591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.165.178
May 12 16:46:09 MainVPS sshd[22591]: Invalid user echo from 129.28.165.178 port 48512
May 12 16:46:11 MainVPS sshd[22591]: Failed password for invalid user echo from 129.28.165.178 port 48512 ssh2
May 12 16:54:20 MainVPS sshd[30009]: Invalid user gan from 129.28.165.178 port 55126
...
2020-05-13 00:46:40
112.220.238.3 attackspam
detected by Fail2Ban
2020-05-13 00:09:21
190.37.220.93 attack
Unauthorized connection attempt detected from IP address 190.37.220.93 to port 445
2020-05-13 00:36:31
108.35.156.188 attackbots
Unauthorized connection attempt detected from IP address 108.35.156.188 to port 5555
2020-05-13 00:51:01
96.82.247.205 attack
Unauthorized connection attempt detected from IP address 96.82.247.205 to port 80
2020-05-13 00:11:27
157.245.162.211 attack
Unauthorized connection attempt detected from IP address 157.245.162.211 to port 5900
2020-05-13 00:06:12
92.242.220.51 attackspam
Unauthorized connection attempt detected from IP address 92.242.220.51 to port 80
2020-05-13 00:53:57
201.229.41.49 attackbots
Unauthorized connection attempt detected from IP address 201.229.41.49 to port 88
2020-05-13 00:31:01

Recently Reported IPs

74.129.2.218 76.132.161.149 36.53.147.184 33.150.117.202
24.252.102.121 122.122.71.216 244.67.147.109 226.177.10.71
30.14.183.24 3.131.24.231 186.200.149.146 5.180.197.161
69.94.131.24 129.10.93.2 31.129.126.131 76.131.101.250
80.14.10.55 48.104.187.3 76.150.162.19 33.152.3.167