Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amstelveen

Region: Noord Holland

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.108.78.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9075
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.108.78.41.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020800 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 08 19:02:53 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 41.78.108.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.78.108.145.in-addr.arpa	name = SURFnet-NL.IPv4.PTR.145.108.x.INVALID.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.106.128.220 attackspambots
2020-05-07 12:29:39.559374-0500  localhost sshd[23575]: Failed password for invalid user cortex from 193.106.128.220 port 46474 ssh2
2020-05-08 08:19:13
218.7.116.183 attackbots
(smtpauth) Failed SMTP AUTH login from 218.7.116.183 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-07 23:23:31 login authenticator failed for (FwQRxIU7h) [218.7.116.183]: 535 Incorrect authentication data (set_id=Kraig@Tavankala.com)
2020-05-08 07:44:08
138.197.180.29 attackspambots
2020-05-07T23:32:21.743598amanda2.illicoweb.com sshd\[6854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.29  user=root
2020-05-07T23:32:23.747071amanda2.illicoweb.com sshd\[6854\]: Failed password for root from 138.197.180.29 port 49542 ssh2
2020-05-07T23:37:29.379360amanda2.illicoweb.com sshd\[7034\]: Invalid user cgh from 138.197.180.29 port 33034
2020-05-07T23:37:29.382207amanda2.illicoweb.com sshd\[7034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.29
2020-05-07T23:37:31.666818amanda2.illicoweb.com sshd\[7034\]: Failed password for invalid user cgh from 138.197.180.29 port 33034 ssh2
...
2020-05-08 07:45:31
194.170.189.196 attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-05-08 08:07:45
145.220.24.215 attackspam
" "
2020-05-08 07:45:03
14.177.235.31 attackspam
Unauthorized connection attempt from IP address 14.177.235.31 on Port 445(SMB)
2020-05-08 08:12:50
36.111.182.132 attackbots
SASL PLAIN auth failed: ruser=...
2020-05-08 08:21:49
213.232.87.114 attack
Attempted to connect 2 times to port 1 UDP
2020-05-08 07:50:24
103.147.185.13 attack
SMTP AUTH FAIL
2020-05-08 07:59:26
95.81.111.111 attackspam
[portscan] Port scan
2020-05-08 07:59:58
190.13.151.1 attackbotsspam
Unauthorized connection attempt from IP address 190.13.151.1 on Port 445(SMB)
2020-05-08 08:09:13
218.75.90.46 attackspam
CMS (WordPress or Joomla) login attempt.
2020-05-08 08:18:53
115.202.73.141 attack
Unauthorized connection attempt from IP address 115.202.73.141 on Port 445(SMB)
2020-05-08 07:57:12
113.161.81.73 attackspambots
Dovecot Invalid User Login Attempt.
2020-05-08 08:04:42
37.152.177.25 attackspambots
5x Failed Password
2020-05-08 07:49:23

Recently Reported IPs

15.140.183.99 65.244.238.27 232.117.208.151 162.128.16.85
114.158.147.107 103.139.168.7 7.171.94.191 52.175.4.10
212.156.212.34 7.47.102.27 30.43.173.127 179.234.183.77
132.102.232.18 23.93.89.211 206.107.48.149 44.221.168.188
76.149.38.56 75.217.229.183 68.15.167.17 30.47.178.167