Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.100.189.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30390
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.100.189.149.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 02:17:23 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 149.189.100.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.189.100.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.19.9.139 attack
Automatic report - Port Scan Attack
2020-02-18 14:57:16
49.68.225.152 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 14:53:47
49.68.155.60 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 15:03:13
77.68.4.74 attackbots
Automatic report - XMLRPC Attack
2020-02-18 15:05:03
104.244.78.197 attackspambots
Feb 18 00:32:20 aragorn sshd[14415]: Invalid user fake from 104.244.78.197
Feb 18 00:32:21 aragorn sshd[14417]: Invalid user admin from 104.244.78.197
...
2020-02-18 15:15:14
196.0.86.154 attackspambots
DATE:2020-02-18 05:55:44, IP:196.0.86.154, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-02-18 15:17:30
91.121.179.189 attackspambots
17 Feb 2020
16:23:44 SRC=91.121.179.189 DPT=62022
2020-02-18 15:29:17
41.137.137.92 attackbotsspam
Feb 18 05:53:59 ws26vmsma01 sshd[152516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.137.137.92
Feb 18 05:54:01 ws26vmsma01 sshd[152516]: Failed password for invalid user gehua from 41.137.137.92 port 45127 ssh2
...
2020-02-18 15:26:19
49.7.14.184 attack
Feb 18 07:18:51 legacy sshd[23273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.7.14.184
Feb 18 07:18:54 legacy sshd[23273]: Failed password for invalid user install from 49.7.14.184 port 35326 ssh2
Feb 18 07:23:08 legacy sshd[23472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.7.14.184
...
2020-02-18 15:04:10
84.94.225.146 attackbots
Received: from barn.elm.relay.mailchannels.net (barn.elm.relay.mailchannels.net [23.83.212.11])
	by m0116792.mta.everyone.net (EON-INBOUND) with ESMTP id m0116792.5e0ea4b1.21ca6a3
	for <@antihotmail.com>; Mon, 17 Feb 2020 20:03:18 -0800
Received: from postfix15.newsletterim.com ([TEMPUNAVAIL]. [84.94.225.146])
	(using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384)
	by 0.0.0.0:2500 (trex/5.18.5);
	Tue, 18 Feb 2020 04:03:17 +0000
2020-02-18 15:28:45
106.13.54.207 attackbots
Feb 18 02:06:38 plusreed sshd[8261]: Invalid user jamey from 106.13.54.207
...
2020-02-18 15:12:30
185.176.27.90 attackbotsspam
02/18/2020-02:15:15.290677 185.176.27.90 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-18 15:20:17
200.54.170.198 attackspam
Invalid user kevyn from 200.54.170.198 port 48438
2020-02-18 15:02:27
123.206.255.181 attackspam
Feb 17 16:41:29 server sshd\[8736\]: Invalid user anastacia from 123.206.255.181
Feb 17 16:41:29 server sshd\[8736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.255.181 
Feb 17 16:41:31 server sshd\[8736\]: Failed password for invalid user anastacia from 123.206.255.181 port 37744 ssh2
Feb 18 07:55:19 server sshd\[21976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.255.181  user=root
Feb 18 07:55:22 server sshd\[21976\]: Failed password for root from 123.206.255.181 port 57778 ssh2
...
2020-02-18 15:32:53
118.163.176.97 attackspam
Feb 18 07:58:26 serwer sshd\[28550\]: Invalid user 123qew from 118.163.176.97 port 39792
Feb 18 07:58:26 serwer sshd\[28550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.176.97
Feb 18 07:58:28 serwer sshd\[28550\]: Failed password for invalid user 123qew from 118.163.176.97 port 39792 ssh2
...
2020-02-18 15:15:48

Recently Reported IPs

110.43.180.75 136.161.155.217 194.178.255.100 194.35.100.86
76.95.39.144 45.66.240.27 64.204.82.19 89.153.135.7
72.244.143.37 253.73.7.233 127.150.90.37 189.197.127.232
197.211.90.119 154.30.186.111 166.73.56.111 59.165.153.23
141.122.18.242 36.132.209.196 22.11.199.26 143.6.226.195