Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: University of Twente

Hostname: unknown

Organization: SURFnet bv

Usage Type: University/College/School

Comments:
Type Details Datetime
attackspam
Port scan on 1 port(s): 53
2020-06-25 03:15:42
attackbotsspam
Port scan on 1 port(s): 53
2020-04-28 01:10:27
attackbotsspam
Port scan on 1 port(s): 53
2019-10-19 22:25:13
Comments on same subnet:
IP Type Details Datetime
145.102.6.73 attackspam
Port scan on 1 port(s): 53
2020-06-25 03:23:48
145.102.6.49 attackbots
Port scan on 1 port(s): 53
2020-06-25 03:01:10
145.102.6.49 attack
Port scan on 1 port(s): 53
2020-05-16 22:39:45
145.102.6.86 attackspambots
Port scan on 1 port(s): 53
2020-05-16 22:39:01
145.102.6.46 attackbots
Port scan on 1 port(s): 53
2020-04-28 01:12:56
145.102.6.57 attack
Port scan on 1 port(s): 53
2020-04-28 01:12:42
145.102.6.49 attack
Port scan on 1 port(s): 53
2020-04-19 23:38:00
145.102.6.73 attackspam
Port scan on 1 port(s): 53
2020-04-19 23:37:49
145.102.6.57 attackbotsspam
Port scan on 1 port(s): 53
2020-04-11 03:33:54
145.102.6.86 attack
Port scan on 1 port(s): 53
2020-04-11 03:33:36
145.102.6.46 attackspambots
Port scan on 1 port(s): 53
2020-04-11 03:25:51
145.102.6.73 attackspam
Port scan detected on *
2020-03-21 05:29:57
145.102.6.55 attackbots
Port scan on 1 port(s): 53
2020-03-19 21:23:10
145.102.6.57 attack
Port scan on 1 port(s): 53
2020-02-20 22:37:44
145.102.6.57 attackspam
Port scan on 1 port(s): 53
2020-02-17 23:32:20
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.102.6.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65504
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.102.6.58.			IN	A

;; AUTHORITY SECTION:
.			3316	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060200 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 02 19:41:54 CST 2019
;; MSG SIZE  rcvd: 116

Host info
58.6.102.145.in-addr.arpa domain name pointer please.visit.www.openintel.nl.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
58.6.102.145.in-addr.arpa	name = please.visit.www.openintel.nl.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
178.33.67.12 attack
Jun 16 22:04:20 onepixel sshd[1456467]: Invalid user administrator from 178.33.67.12 port 40170
Jun 16 22:04:20 onepixel sshd[1456467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.67.12 
Jun 16 22:04:20 onepixel sshd[1456467]: Invalid user administrator from 178.33.67.12 port 40170
Jun 16 22:04:22 onepixel sshd[1456467]: Failed password for invalid user administrator from 178.33.67.12 port 40170 ssh2
Jun 16 22:09:05 onepixel sshd[1458994]: Invalid user uma from 178.33.67.12 port 40848
2020-06-17 06:27:00
46.197.1.66 attackspam
20/6/16@17:24:43: FAIL: Alarm-Network address from=46.197.1.66
20/6/16@17:24:44: FAIL: Alarm-Network address from=46.197.1.66
...
2020-06-17 06:23:27
45.124.27.116 attackspambots
Port probing on unauthorized port 445
2020-06-17 06:03:41
193.70.12.205 attack
2020-06-16T21:36:14.027638homeassistant sshd[13013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.12.205  user=root
2020-06-16T21:36:16.292067homeassistant sshd[13013]: Failed password for root from 193.70.12.205 port 43924 ssh2
...
2020-06-17 06:04:18
175.24.49.210 attackspambots
Invalid user kost from 175.24.49.210 port 35002
2020-06-17 06:20:40
154.8.196.30 attackspam
SSH/22 MH Probe, BF, Hack -
2020-06-17 06:15:20
104.248.134.212 attack
Jun 16 23:49:41 minden010 sshd[9676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.134.212
Jun 16 23:49:44 minden010 sshd[9676]: Failed password for invalid user www from 104.248.134.212 port 34662 ssh2
Jun 16 23:52:33 minden010 sshd[11734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.134.212
...
2020-06-17 06:17:44
106.54.255.11 attackspambots
Jun 16 17:47:12 vps46666688 sshd[28092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.255.11
Jun 16 17:47:13 vps46666688 sshd[28092]: Failed password for invalid user dstserver from 106.54.255.11 port 50206 ssh2
...
2020-06-17 06:11:10
212.64.95.2 attack
2020-06-16T23:49:01.714112vps751288.ovh.net sshd\[29785\]: Invalid user hayung from 212.64.95.2 port 56576
2020-06-16T23:49:01.723800vps751288.ovh.net sshd\[29785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.95.2
2020-06-16T23:49:03.283702vps751288.ovh.net sshd\[29785\]: Failed password for invalid user hayung from 212.64.95.2 port 56576 ssh2
2020-06-16T23:51:02.843339vps751288.ovh.net sshd\[29809\]: Invalid user syslog from 212.64.95.2 port 60938
2020-06-16T23:51:02.850339vps751288.ovh.net sshd\[29809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.95.2
2020-06-17 06:12:02
210.74.11.97 attackspambots
Jun 17 00:02:06 eventyay sshd[8526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.74.11.97
Jun 17 00:02:07 eventyay sshd[8526]: Failed password for invalid user 123 from 210.74.11.97 port 59374 ssh2
Jun 17 00:04:40 eventyay sshd[8677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.74.11.97
...
2020-06-17 06:26:43
110.45.244.102 attack
Jun 16 13:43:00 dignus sshd[26538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.45.244.102
Jun 16 13:43:02 dignus sshd[26538]: Failed password for invalid user admin from 110.45.244.102 port 58928 ssh2
Jun 16 13:46:49 dignus sshd[26815]: Invalid user sammy from 110.45.244.102 port 60151
Jun 16 13:46:49 dignus sshd[26815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.45.244.102
Jun 16 13:46:50 dignus sshd[26815]: Failed password for invalid user sammy from 110.45.244.102 port 60151 ssh2
...
2020-06-17 06:31:21
106.12.91.36 attack
Invalid user admin from 106.12.91.36 port 45942
2020-06-17 06:12:35
171.244.140.174 attack
2020-06-16T23:49:28.185128vps751288.ovh.net sshd\[29795\]: Invalid user joao from 171.244.140.174 port 26795
2020-06-16T23:49:28.194909vps751288.ovh.net sshd\[29795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.140.174
2020-06-16T23:49:30.462523vps751288.ovh.net sshd\[29795\]: Failed password for invalid user joao from 171.244.140.174 port 26795 ssh2
2020-06-16T23:53:10.688023vps751288.ovh.net sshd\[29829\]: Invalid user sofia from 171.244.140.174 port 29047
2020-06-16T23:53:10.700786vps751288.ovh.net sshd\[29829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.140.174
2020-06-17 05:57:03
114.67.64.28 attackspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-06-17 06:28:04
94.23.57.17 attackbotsspam
MYH,DEF GET /wp-login.php
2020-06-17 06:10:02

Recently Reported IPs

145.102.6.57 105.163.205.231 93.219.188.78 185.183.243.6
203.26.148.124 66.178.220.198 85.254.49.235 202.24.167.238
1.205.39.36 144.65.117.73 58.112.49.54 152.40.213.162
159.247.28.59 183.193.136.99 105.158.30.87 198.142.53.245
61.59.172.142 103.3.220.108 183.212.127.220 135.196.65.159