Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Edsbyn

Region: Gävleborg County

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.145.43.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48211
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;91.145.43.249.			IN	A

;; AUTHORITY SECTION:
.			132	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082901 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Aug 30 08:18:16 CST 2020
;; MSG SIZE  rcvd: 117
Host info
249.43.145.91.in-addr.arpa has no PTR record
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
249.43.145.91.in-addr.arpa	name = 43-249.helsingenetovanaker.se.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
189.203.233.206 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 12:41:28,832 INFO [amun_request_handler] PortScan Detected on Port: 445 (189.203.233.206)
2019-09-22 01:49:18
61.69.78.78 attack
Sep 21 14:53:00 fr01 sshd[3940]: Invalid user vmware from 61.69.78.78
...
2019-09-22 02:26:40
222.186.15.110 attackbots
Sep 21 20:06:02 cvbnet sshd[27092]: Failed password for root from 222.186.15.110 port 38844 ssh2
Sep 21 20:06:06 cvbnet sshd[27092]: Failed password for root from 222.186.15.110 port 38844 ssh2
2019-09-22 02:13:09
122.97.128.130 attackspambots
Unauthorised access (Sep 21) SRC=122.97.128.130 LEN=44 TTL=48 ID=55702 TCP DPT=23 WINDOW=58006 SYN
2019-09-22 02:06:33
112.85.42.232 attackspam
F2B jail: sshd. Time: 2019-09-21 19:40:06, Reported by: VKReport
2019-09-22 01:56:04
91.197.191.210 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/91.197.191.210/ 
 RU - 1H : (201)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN197535 
 
 IP : 91.197.191.210 
 
 CIDR : 91.197.191.0/24 
 
 PREFIX COUNT : 6 
 
 UNIQUE IP COUNT : 1536 
 
 
 WYKRYTE ATAKI Z ASN197535 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-22 02:07:08
45.141.84.10 attack
2019-09-21T12:54:00Z - RDP login failed multiple times. (45.141.84.10)
2019-09-22 01:47:06
112.85.42.177 attackbots
Unauthorized SSH login attempts
2019-09-22 02:19:48
109.51.146.4 attack
2019-09-21T09:55:25.5103521495-001 sshd\[50015\]: Failed password for invalid user tc from 109.51.146.4 port 33728 ssh2
2019-09-21T10:08:44.8255961495-001 sshd\[50922\]: Invalid user marcelo from 109.51.146.4 port 49564
2019-09-21T10:08:44.8285641495-001 sshd\[50922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=a109-51-146-4.cpe.netcabo.pt
2019-09-21T10:08:46.5005881495-001 sshd\[50922\]: Failed password for invalid user marcelo from 109.51.146.4 port 49564 ssh2
2019-09-21T10:13:01.9843211495-001 sshd\[51220\]: Invalid user karika from 109.51.146.4 port 35868
2019-09-21T10:13:01.9875121495-001 sshd\[51220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=a109-51-146-4.cpe.netcabo.pt
...
2019-09-22 01:50:34
51.38.200.249 attackspam
Sep 21 03:04:05 cumulus sshd[27755]: Did not receive identification string from 51.38.200.249 port 41868
Sep 21 03:04:05 cumulus sshd[27756]: Did not receive identification string from 51.38.200.249 port 37632
Sep 21 03:04:05 cumulus sshd[27757]: Did not receive identification string from 51.38.200.249 port 42234
Sep 21 03:04:05 cumulus sshd[27758]: Did not receive identification string from 51.38.200.249 port 55054
Sep 21 03:04:05 cumulus sshd[27759]: Did not receive identification string from 51.38.200.249 port 48626
Sep 21 03:04:05 cumulus sshd[27760]: Did not receive identification string from 51.38.200.249 port 58322
Sep 21 03:04:05 cumulus sshd[27761]: Did not receive identification string from 51.38.200.249 port 41100
Sep 21 03:04:47 cumulus sshd[27766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.200.249  user=r.r
Sep 21 03:04:48 cumulus sshd[27768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui........
-------------------------------
2019-09-22 02:26:58
209.97.142.132 attackspam
LAMP,DEF GET /wp-login.php
2019-09-22 01:48:24
139.215.217.181 attackbotsspam
SSH invalid-user multiple login attempts
2019-09-22 02:16:08
112.105.255.88 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 12:43:08,786 INFO [amun_request_handler] PortScan Detected on Port: 445 (112.105.255.88)
2019-09-22 01:40:06
31.13.63.222 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 16:46:49,286 INFO [amun_request_handler] PortScan Detected on Port: 445 (31.13.63.222)
2019-09-22 01:57:40
54.38.241.162 attackbots
Sep 21 07:33:14 web9 sshd\[18927\]: Invalid user login from 54.38.241.162
Sep 21 07:33:14 web9 sshd\[18927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.241.162
Sep 21 07:33:16 web9 sshd\[18927\]: Failed password for invalid user login from 54.38.241.162 port 38368 ssh2
Sep 21 07:38:00 web9 sshd\[19851\]: Invalid user puebra from 54.38.241.162
Sep 21 07:38:00 web9 sshd\[19851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.241.162
2019-09-22 01:50:59

Recently Reported IPs

61.196.193.238 82.216.99.220 132.77.107.60 82.173.122.0
196.189.99.107 173.141.159.217 129.19.63.107 159.255.227.163
202.229.108.65 52.42.201.83 107.173.122.102 105.172.101.162
46.112.244.209 78.64.169.253 31.247.189.0 156.198.23.173
177.32.52.226 59.1.7.172 86.217.115.60 212.120.191.186