Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Diemen

Region: North Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.112.174.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24683
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.112.174.124.		IN	A

;; AUTHORITY SECTION:
.			346	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020101 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 15:35:25 CST 2020
;; MSG SIZE  rcvd: 119
Host info
124.174.112.145.in-addr.arpa domain name pointer SURFnet-NL.IPv4.PTR.145.112.x.INVALID.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
124.174.112.145.in-addr.arpa	name = SURFnet-NL.IPv4.PTR.145.112.x.INVALID.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.82.77.33 attackbots
10/04/2019-01:40:58.425027 80.82.77.33 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-04 14:21:53
77.234.40.132 attackbots
Sep  3 04:04:29 localhost postfix/smtpd[30134]: lost connection after CONNECT from unknown[77.234.40.132]
Sep  3 04:05:06 localhost postfix/smtpd[30176]: lost connection after AUTH from unknown[77.234.40.132]
Sep  3 04:10:30 localhost postfix/smtpd[30134]: lost connection after AUTH from unknown[77.234.40.132]
Sep  3 04:22:18 localhost postfix/smtpd[2333]: lost connection after EHLO from unknown[77.234.40.132]
Sep  3 04:22:49 localhost postfix/smtpd[2327]: lost connection after EHLO from unknown[77.234.40.132]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=77.234.40.132
2019-10-04 14:25:55
23.94.133.72 attackbots
Oct  4 07:59:10 saschabauer sshd[18962]: Failed password for root from 23.94.133.72 port 55792 ssh2
2019-10-04 14:07:16
159.65.144.233 attackbots
auto-add
2019-10-04 14:21:40
181.63.245.127 attackspambots
Oct  1 14:44:20 own sshd[26525]: Invalid user ftpuser from 181.63.245.127
Oct  1 14:44:20 own sshd[26525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.63.245.127
Oct  1 14:44:21 own sshd[26525]: Failed password for invalid user ftpuser from 181.63.245.127 port 41121 ssh2
Oct  1 14:44:22 own sshd[26525]: Received disconnect from 181.63.245.127 port 41121:11: Normal Shutdown [preauth]
Oct  1 14:44:22 own sshd[26525]: Disconnected from 181.63.245.127 port 41121 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=181.63.245.127
2019-10-04 14:16:43
106.12.132.187 attackbots
Oct  4 05:51:25 tux-35-217 sshd\[1868\]: Invalid user P@$$W0RD1 from 106.12.132.187 port 44058
Oct  4 05:51:25 tux-35-217 sshd\[1868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.187
Oct  4 05:51:27 tux-35-217 sshd\[1868\]: Failed password for invalid user P@$$W0RD1 from 106.12.132.187 port 44058 ssh2
Oct  4 05:56:21 tux-35-217 sshd\[1879\]: Invalid user P4$$w0rd@1234 from 106.12.132.187 port 51758
Oct  4 05:56:21 tux-35-217 sshd\[1879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.187
...
2019-10-04 14:28:28
103.114.107.203 attackspam
Oct  4 10:56:46 lcl-usvr-01 sshd[21219]: Invalid user SSH.TOT.NHAT.TAI.SELLSSH247.COM from 103.114.107.203
2019-10-04 14:11:32
159.89.13.0 attackspambots
2019-10-04T06:03:51.539785abusebot-7.cloudsearch.cf sshd\[16856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.13.0  user=root
2019-10-04 14:18:56
222.186.173.154 attack
Oct  4 06:11:02 *** sshd[23156]: User root from 222.186.173.154 not allowed because not listed in AllowUsers
2019-10-04 14:37:06
218.27.224.240 attack
Unauthorised access (Oct  4) SRC=218.27.224.240 LEN=40 TTL=49 ID=48931 TCP DPT=8080 WINDOW=42485 SYN 
Unauthorised access (Oct  4) SRC=218.27.224.240 LEN=40 TTL=49 ID=60588 TCP DPT=8080 WINDOW=42485 SYN 
Unauthorised access (Oct  3) SRC=218.27.224.240 LEN=40 TTL=49 ID=11567 TCP DPT=8080 WINDOW=35590 SYN
2019-10-04 14:39:19
117.23.69.18 attackbots
Unauthorised access (Oct  4) SRC=117.23.69.18 LEN=40 TOS=0x10 PREC=0x40 TTL=48 ID=24794 TCP DPT=8080 WINDOW=36154 SYN
2019-10-04 14:04:37
31.170.51.251 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-04 14:42:26
52.164.211.22 attack
2019-10-04T05:57:48.243777abusebot-2.cloudsearch.cf sshd\[8283\]: Invalid user Germany@123 from 52.164.211.22 port 58086
2019-10-04 14:08:03
185.36.81.231 attackbotsspam
Rude login attack (5 tries in 1d)
2019-10-04 14:01:45
165.22.174.186 attackbotsspam
" "
2019-10-04 14:25:06

Recently Reported IPs

52.66.136.113 124.227.197.26 122.51.135.40 52.58.96.173
35.180.232.167 220.173.20.108 162.243.131.51 193.26.21.115
178.170.156.40 90.220.20.234 142.53.124.152 218.180.2.174
175.72.198.200 83.161.201.79 149.12.37.206 34.195.94.20
154.63.159.133 125.59.107.244 17.179.253.174 112.25.176.62