Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.120.221.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53531
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.120.221.205.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 11:44:32 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 205.221.120.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 205.221.120.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
137.226.113.56 attackbots
Port Scan
...
2020-07-14 02:14:02
109.107.178.203 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2020-07-14 02:15:29
5.188.206.195 attack
Port probe and 6 failed login attempts on SMTP:25.
IP auto-blocked.
2020-07-14 01:59:31
118.233.194.199 attackspambots
Unauthorised access (Jul 13) SRC=118.233.194.199 LEN=40 TTL=48 ID=12289 TCP DPT=23 WINDOW=8670 SYN
2020-07-14 02:32:57
220.133.214.26 attackspam
firewall-block, port(s): 23/tcp
2020-07-14 02:15:54
190.226.244.8 attackbotsspam
$f2bV_matches
2020-07-14 02:26:00
206.189.171.204 attackbots
detected by Fail2Ban
2020-07-14 02:01:07
196.52.43.106 attackbotsspam
Port scan denied
2020-07-14 02:25:31
86.120.27.60 attack
Automatic report - Banned IP Access
2020-07-14 02:24:43
77.121.174.100 attackbotsspam
Automatic report - Banned IP Access
2020-07-14 02:00:03
104.140.188.2 attackbots
 TCP (SYN) 104.140.188.2:50052 -> port 21, len 44
2020-07-14 02:08:22
139.198.191.217 attack
2020-07-13T16:45:18.695165galaxy.wi.uni-potsdam.de sshd[12081]: Invalid user osboxes from 139.198.191.217 port 38354
2020-07-13T16:45:18.700381galaxy.wi.uni-potsdam.de sshd[12081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.217
2020-07-13T16:45:18.695165galaxy.wi.uni-potsdam.de sshd[12081]: Invalid user osboxes from 139.198.191.217 port 38354
2020-07-13T16:45:20.935895galaxy.wi.uni-potsdam.de sshd[12081]: Failed password for invalid user osboxes from 139.198.191.217 port 38354 ssh2
2020-07-13T16:47:42.916293galaxy.wi.uni-potsdam.de sshd[12337]: Invalid user like from 139.198.191.217 port 32876
2020-07-13T16:47:42.921288galaxy.wi.uni-potsdam.de sshd[12337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.217
2020-07-13T16:47:42.916293galaxy.wi.uni-potsdam.de sshd[12337]: Invalid user like from 139.198.191.217 port 32876
2020-07-13T16:47:44.925949galaxy.wi.uni-potsdam.de sshd[1233
...
2020-07-14 02:27:09
129.208.242.177 attack
Email rejected due to spam filtering
2020-07-14 02:08:07
218.94.54.84 attackbotsspam
SSH Brute-Force reported by Fail2Ban
2020-07-14 02:29:48
51.158.27.21 attackspam
" "
2020-07-14 02:03:47

Recently Reported IPs

39.77.67.5 76.123.206.185 235.252.55.101 45.190.232.168
222.22.12.72 92.89.170.53 122.36.94.196 164.68.111.158
69.255.148.151 31.232.214.243 250.167.160.174 64.18.146.140
103.150.38.11 39.46.161.114 248.171.55.110 224.243.37.172
239.198.239.60 167.6.164.157 163.44.250.19 157.139.198.7