Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Newark

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 97.222.40.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47315
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;97.222.40.145.			IN	A

;; AUTHORITY SECTION:
.			547	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019113002 1800 900 604800 86400

;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 01 13:32:27 CST 2019
;; MSG SIZE  rcvd: 117
Host info
145.40.222.97.in-addr.arpa domain name pointer 145.sub-97-222-40.myvzw.com.
Nslookup info:
Server:		100.100.2.136
Address:	100.100.2.136#53

Non-authoritative answer:
145.40.222.97.in-addr.arpa	name = 145.sub-97-222-40.myvzw.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
185.176.27.174 attack
29.06.2019 14:20:34 Connection to port 62408 blocked by firewall
2019-06-29 23:19:05
95.170.228.113 attackbotsspam
NAME : RUPKKI-CUST-RESIDENTAL CIDR :  DDoS attack Slovakia (Slovak Republic) "" - block certain countries :) IP: 95.170.228.113  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-29 23:21:26
158.69.212.109 attackspam
SSHAttack
2019-06-29 23:13:48
176.65.2.5 attackspambots
This IP address was blacklisted for the following reason:  /de/jobs/mechatroniker-m-w/&%20and%201%3E1 @ 2018-10-15T00:43:09+02:00.
2019-06-29 23:12:18
54.39.145.31 attackbotsspam
Invalid user devserver from 54.39.145.31 port 53104
2019-06-29 22:58:20
23.129.64.212 attack
SSHAttack
2019-06-29 22:49:57
112.133.192.184 attackspambots
Unauthorized connection attempt from IP address 112.133.192.184 on Port 445(SMB)
2019-06-29 22:26:12
140.86.12.31 attack
Jun 29 14:06:03 lnxmail61 sshd[13486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.86.12.31
Jun 29 14:06:03 lnxmail61 sshd[13486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.86.12.31
2019-06-29 23:17:48
195.54.21.219 attack
Unauthorized connection attempt from IP address 195.54.21.219 on Port 445(SMB)
2019-06-29 22:38:31
45.56.72.91 attackspambots
Sql/code injection probe
2019-06-29 23:22:43
78.161.45.153 attackspambots
Unauthorized connection attempt from IP address 78.161.45.153 on Port 445(SMB)
2019-06-29 22:37:10
177.23.61.120 attack
libpam_shield report: forced login attempt
2019-06-29 22:39:07
149.56.44.47 attackspam
SSHAttack
2019-06-29 23:14:12
187.131.86.190 attack
Unauthorized connection attempt from IP address 187.131.86.190 on Port 445(SMB)
2019-06-29 22:33:55
23.129.64.206 attackspambots
SSHAttack
2019-06-29 22:53:35

Recently Reported IPs

27.46.188.189 31.94.172.215 24.35.83.170 103.10.30.207
125.138.89.140 91.146.204.131 109.40.185.61 52.47.110.189
52.218.247.15 165.100.136.237 210.206.167.237 175.126.37.16
57.162.121.246 85.210.31.27 82.134.207.32 88.163.106.204
34.226.111.193 182.25.136.9 24.70.21.87 163.215.70.203