Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.117.168.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32396
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.117.168.136.		IN	A

;; AUTHORITY SECTION:
.			182	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060400 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 04 19:03:25 CST 2024
;; MSG SIZE  rcvd: 108
Host info
136.168.117.145.in-addr.arpa domain name pointer a168-136.amc.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.168.117.145.in-addr.arpa	name = a168-136.amc.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
157.25.173.178 attackspam
Unauthorized connection attempt from IP address 157.25.173.178 on port 587
2020-09-07 14:59:28
45.118.34.143 attackspambots
(smtpauth) Failed SMTP AUTH login from 45.118.34.143 (IN/India/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-09-07 05:57:24 plain authenticator failed for ([45.118.34.143]) [45.118.34.143]: 535 Incorrect authentication data (set_id=info)
2020-09-07 14:59:46
87.242.234.181 attackspam
$f2bV_matches
2020-09-07 14:46:32
152.136.130.218 attackbotsspam
prod6
...
2020-09-07 14:42:44
180.190.238.157 attackbotsspam
Scanned 3 times in the last 24 hours on port 22
2020-09-07 14:45:59
222.254.63.193 attack
20/9/6@12:52:09: FAIL: Alarm-Network address from=222.254.63.193
20/9/6@12:52:09: FAIL: Alarm-Network address from=222.254.63.193
...
2020-09-07 14:38:01
115.60.168.180 attackspambots
Sep  6 18:51:11 localhost sshd[49475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.60.168.180  user=root
Sep  6 18:51:13 localhost sshd[49475]: Failed password for root from 115.60.168.180 port 18317 ssh2
Sep  6 18:55:32 localhost sshd[49784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.60.168.180  user=root
Sep  6 18:55:34 localhost sshd[49784]: Failed password for root from 115.60.168.180 port 17661 ssh2
Sep  6 19:00:36 localhost sshd[50203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.60.168.180  user=root
Sep  6 19:00:38 localhost sshd[50203]: Failed password for root from 115.60.168.180 port 18845 ssh2
...
2020-09-07 14:36:55
36.88.113.75 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 14:44:02
180.249.183.191 attackbotsspam
1599411138 - 09/06/2020 18:52:18 Host: 180.249.183.191/180.249.183.191 Port: 445 TCP Blocked
2020-09-07 14:26:13
192.169.243.111 attackbotsspam
192.169.243.111 - - [07/Sep/2020:07:28:58 +0100] "POST /wp-login.php HTTP/1.1" 200 1874 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.169.243.111 - - [07/Sep/2020:07:29:05 +0100] "POST /wp-login.php HTTP/1.1" 200 1858 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.169.243.111 - - [07/Sep/2020:07:29:05 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-07 14:42:13
193.236.78.176 attack
bruteforce detected
2020-09-07 14:46:47
112.133.251.60 attack
Unauthorised login to NAS
2020-09-07 14:51:47
113.88.192.97 attackbots
Icarus honeypot on github
2020-09-07 14:43:34
72.221.232.144 attackbotsspam
Brute force attempt
2020-09-07 14:19:40
222.186.42.137 attackbots
Sep  7 08:19:15 piServer sshd[23875]: Failed password for root from 222.186.42.137 port 16246 ssh2
Sep  7 08:19:19 piServer sshd[23875]: Failed password for root from 222.186.42.137 port 16246 ssh2
Sep  7 08:19:22 piServer sshd[23875]: Failed password for root from 222.186.42.137 port 16246 ssh2
...
2020-09-07 14:27:13

Recently Reported IPs

29.190.109.217 205.112.242.174 184.185.120.12 175.180.28.119
171.50.255.192 102.53.148.85 30.10.169.179 131.45.229.34
71.237.79.54 217.151.119.232 95.228.236.36 92.108.135.51
156.144.104.95 52.241.18.32 195.235.240.216 255.181.229.19
220.198.112.152 227.94.118.213 41.57.80.243 136.229.152.64