Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: North Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: SURFnet bv

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.121.89.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25922
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.121.89.45.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082700 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 28 00:44:39 CST 2019
;; MSG SIZE  rcvd: 117
Host info
45.89.121.145.in-addr.arpa domain name pointer 145.121.early-registration.of.surfnet.invalid.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
45.89.121.145.in-addr.arpa	name = 145.121.early-registration.of.surfnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
181.126.97.235 attackspambots
port 23
2019-12-17 02:53:23
188.190.164.50 attack
REQUESTED PAGE: /wp-admin/link.php
2019-12-17 02:51:12
181.49.132.18 attackspambots
Dec 16 18:20:24 ns381471 sshd[31697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.132.18
Dec 16 18:20:26 ns381471 sshd[31697]: Failed password for invalid user gdm from 181.49.132.18 port 60658 ssh2
2019-12-17 02:49:38
187.204.0.113 attack
Automatic report - Port Scan Attack
2019-12-17 02:56:23
138.68.111.27 attack
Dec 16 18:06:58 l02a sshd[14860]: Invalid user brongel from 138.68.111.27
Dec 16 18:07:00 l02a sshd[14860]: Failed password for invalid user brongel from 138.68.111.27 port 50990 ssh2
Dec 16 18:06:58 l02a sshd[14860]: Invalid user brongel from 138.68.111.27
Dec 16 18:07:00 l02a sshd[14860]: Failed password for invalid user brongel from 138.68.111.27 port 50990 ssh2
2019-12-17 02:41:38
104.238.110.156 attackbotsspam
Dec 16 16:49:32 web8 sshd\[20301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.238.110.156  user=root
Dec 16 16:49:34 web8 sshd\[20301\]: Failed password for root from 104.238.110.156 port 59008 ssh2
Dec 16 16:55:40 web8 sshd\[23377\]: Invalid user guest from 104.238.110.156
Dec 16 16:55:40 web8 sshd\[23377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.238.110.156
Dec 16 16:55:42 web8 sshd\[23377\]: Failed password for invalid user guest from 104.238.110.156 port 38104 ssh2
2019-12-17 03:11:02
124.30.44.214 attackbotsspam
SSH Brute-Forcing (server1)
2019-12-17 03:17:51
106.13.125.84 attack
Dec 16 19:14:17 lnxweb62 sshd[3194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.125.84
Dec 16 19:14:17 lnxweb62 sshd[3194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.125.84
2019-12-17 02:43:46
129.204.87.153 attack
Dec 16 15:23:59 game-panel sshd[524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.87.153
Dec 16 15:24:01 game-panel sshd[524]: Failed password for invalid user meinich from 129.204.87.153 port 52916 ssh2
Dec 16 15:32:36 game-panel sshd[912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.87.153
2019-12-17 03:01:00
46.105.110.79 attack
detected by Fail2Ban
2019-12-17 03:15:19
106.75.7.109 attack
Ganiw.Botnet, Gh0st.Rat.Botnet
2019-12-17 03:15:04
41.219.190.106 attack
Unauthorized connection attempt detected from IP address 41.219.190.106 to port 445
2019-12-17 02:40:49
92.247.170.73 attackspambots
Postfix Brute-Force reported by Fail2Ban
2019-12-17 02:40:31
54.219.134.190 attackspam
...
2019-12-17 03:13:06
40.92.71.25 attack
Dec 16 17:42:25 debian-2gb-vpn-nbg1-1 kernel: [885714.878593] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.71.25 DST=78.46.192.101 LEN=52 TOS=0x02 PREC=0x00 TTL=109 ID=30771 DF PROTO=TCP SPT=41646 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0
2019-12-17 03:07:57

Recently Reported IPs

212.182.252.188 157.49.236.76 70.94.187.5 49.35.49.163
171.47.195.147 135.181.134.39 146.134.233.252 154.169.77.76
169.129.57.223 37.247.180.132 183.182.99.61 10.164.180.214
132.154.55.58 39.124.129.60 58.54.221.159 175.54.109.57
123.117.185.211 64.77.15.125 37.76.231.207 129.255.46.222