Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.12.218.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49697
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.12.218.20.			IN	A

;; AUTHORITY SECTION:
.			246	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 18:18:37 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 20.218.12.145.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
b';; Truncated, retrying in TCP mode.
20.218.12.145.in-addr.arpa	name = grondkamers.nl.
20.218.12.145.in-addr.arpa	name = versterkingspuntappingedam.nl.
20.218.12.145.in-addr.arpa	name = versterkingspuntloppersum.nl.
20.218.12.145.in-addr.arpa	name = meldplichttelecomwet.nl.
20.218.12.145.in-addr.arpa	name = versterkingspunttenpost.nl.
20.218.12.145.in-addr.arpa	name = meldpuntbodemkwaliteit.agentschapnl.nl.
20.218.12.145.in-addr.arpa	name = versterkingspunthethogeland.nl.
20.218.12.145.in-addr.arpa	name = versterkingspunttenboer.nl.
20.218.12.145.in-addr.arpa	name = q-bank.eu.
20.218.12.145.in-addr.arpa	name = bureau-energieprojecten.nl.
20.218.12.145.in-addr.arpa	name = minezk.nl.
20.218.12.145.in-addr.arpa	name = versterkingspuntuithuizen.nl.
20.218.12.145.in-addr.arpa	name = arbiteraardbevingsschade.nl.
20.218.12.145.in-addr.arpa	name = minez.nl.
20.218.12.145.in-addr.arpa	name = versterkingspuntuithuizermeeden.nl.
20.218.12.145.in-addr.arpa	name = versterkingspunteemsdelta.nl.
20.218.12.145.in-addr.arpa	name = versterkingspuntmidden-groningen.nl.
20.218.12.145.in-addr.arpa	name = versterkingspuntgroningen.nl.
20.218.12.145.in-addr.arpa	name = versterkingspuntoldambt.nl.
20.218.12.145.in-addr.arpa	name = octrooicentrum.nl.
20.218.12.145.in-addr.arpa	name = minlnv.nl.
20.218.12.145.in-addr.arpa	name = ez.nl.
20.218.12.145.in-addr.arpa	name = waterasleverage.org.
20.218.12.145.in-addr.arpa	name = energielabelvoorwoningen.nl.
20.218.12.145.in-addr.arpa	name = versterkingspuntdelfzijl.nl.
20.218.12.145.in-addr.arpa	name = versterkingspuntmiddengroningen.nl.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
119.45.199.173 attackbotsspam
20 attempts against mh-ssh on mist
2020-09-14 05:22:51
193.169.252.217 attackbotsspam
Icarus honeypot on github
2020-09-14 05:18:33
115.98.229.146 attackbots
20/9/13@12:58:14: FAIL: IoT-Telnet address from=115.98.229.146
...
2020-09-14 05:28:18
164.90.224.231 attackspam
Sep 13 20:22:50 localhost sshd[1665835]: Failed password for root from 164.90.224.231 port 52672 ssh2
Sep 13 20:26:34 localhost sshd[1673568]: Invalid user sanija from 164.90.224.231 port 38320
Sep 13 20:26:34 localhost sshd[1673568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.224.231 
Sep 13 20:26:34 localhost sshd[1673568]: Invalid user sanija from 164.90.224.231 port 38320
Sep 13 20:26:36 localhost sshd[1673568]: Failed password for invalid user sanija from 164.90.224.231 port 38320 ssh2
...
2020-09-14 05:15:47
111.21.255.2 attackbots
Sep 13 20:44:46 relay postfix/smtpd\[10142\]: warning: unknown\[111.21.255.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 20:45:00 relay postfix/smtpd\[10147\]: warning: unknown\[111.21.255.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 20:45:14 relay postfix/smtpd\[10142\]: warning: unknown\[111.21.255.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 21:01:22 relay postfix/smtpd\[18323\]: warning: unknown\[111.21.255.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 21:01:37 relay postfix/smtpd\[18326\]: warning: unknown\[111.21.255.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-14 05:18:52
182.61.3.119 attackbotsspam
Sep 13 17:53:02 firewall sshd[31901]: Failed password for root from 182.61.3.119 port 43834 ssh2
Sep 13 17:57:10 firewall sshd[32028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.3.119  user=root
Sep 13 17:57:12 firewall sshd[32028]: Failed password for root from 182.61.3.119 port 34837 ssh2
...
2020-09-14 05:25:58
200.52.80.34 attack
Sep  9 14:45:27 Ubuntu-1404-trusty-64-minimal sshd\[32510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34  user=root
Sep  9 14:45:29 Ubuntu-1404-trusty-64-minimal sshd\[32510\]: Failed password for root from 200.52.80.34 port 38106 ssh2
Sep  9 14:58:02 Ubuntu-1404-trusty-64-minimal sshd\[7801\]: Invalid user invite from 200.52.80.34
Sep  9 14:58:02 Ubuntu-1404-trusty-64-minimal sshd\[7801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
Sep  9 14:58:04 Ubuntu-1404-trusty-64-minimal sshd\[7801\]: Failed password for invalid user invite from 200.52.80.34 port 48376 ssh2
2020-09-14 05:26:41
203.192.219.7 attack
"fail2ban match"
2020-09-14 05:11:52
190.215.112.122 attackspam
Sep 13 19:42:12 inter-technics sshd[31110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.215.112.122  user=root
Sep 13 19:42:13 inter-technics sshd[31110]: Failed password for root from 190.215.112.122 port 38021 ssh2
Sep 13 19:46:57 inter-technics sshd[31388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.215.112.122  user=root
Sep 13 19:46:59 inter-technics sshd[31388]: Failed password for root from 190.215.112.122 port 43302 ssh2
Sep 13 19:51:42 inter-technics sshd[31704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.215.112.122  user=root
Sep 13 19:51:45 inter-technics sshd[31704]: Failed password for root from 190.215.112.122 port 48583 ssh2
...
2020-09-14 05:09:48
94.191.11.96 attackspam
94.191.11.96 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 13 14:47:20 jbs1 sshd[9648]: Failed password for root from 68.79.60.45 port 49366 ssh2
Sep 13 14:51:04 jbs1 sshd[10999]: Failed password for root from 201.0.25.94 port 41441 ssh2
Sep 13 14:50:11 jbs1 sshd[10654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.11.96  user=root
Sep 13 14:50:13 jbs1 sshd[10654]: Failed password for root from 94.191.11.96 port 46214 ssh2
Sep 13 14:47:38 jbs1 sshd[9747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.194.152.238  user=root
Sep 13 14:47:39 jbs1 sshd[9747]: Failed password for root from 190.194.152.238 port 54166 ssh2

IP Addresses Blocked:

68.79.60.45 (CN/China/-)
201.0.25.94 (BR/Brazil/-)
2020-09-14 05:36:14
182.42.47.133 attackspambots
$f2bV_matches
2020-09-14 05:21:18
82.253.141.54 attackbotsspam
Automatic report - Banned IP Access
2020-09-14 05:12:55
104.244.78.136 attack
Sep 13 20:04:39 XXX sshd[60692]: Invalid user cablecom from 104.244.78.136 port 34760
2020-09-14 05:07:37
209.141.46.38 attackbotsspam
2020-09-13T20:38:05+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-09-14 05:33:29
157.245.108.109 attack
bruteforce detected
2020-09-14 05:33:14

Recently Reported IPs

145.14.144.196 145.14.151.130 145.14.148.163 145.14.151.14
169.232.45.233 145.239.140.103 145.239.142.153 145.239.140.71
145.239.144.64 145.239.138.162 145.239.14.215 145.239.136.73
145.239.141.193 145.239.142.66 145.239.138.181 145.239.140.65
145.239.15.179 145.239.166.62 145.239.156.95 145.239.174.146