Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.122.114.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47744
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.122.114.164.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 22:43:10 CST 2025
;; MSG SIZE  rcvd: 108
Host info
164.114.122.145.in-addr.arpa domain name pointer 145.122.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.114.122.145.in-addr.arpa	name = 145.122.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.82.32.25 attackbots
xmlrpc attack
2019-11-06 15:52:25
188.166.246.46 attack
Nov  6 07:19:40 vps58358 sshd\[11495\]: Invalid user 123456 from 188.166.246.46Nov  6 07:19:41 vps58358 sshd\[11495\]: Failed password for invalid user 123456 from 188.166.246.46 port 38464 ssh2Nov  6 07:24:05 vps58358 sshd\[11528\]: Invalid user tie123 from 188.166.246.46Nov  6 07:24:07 vps58358 sshd\[11528\]: Failed password for invalid user tie123 from 188.166.246.46 port 49016 ssh2Nov  6 07:28:29 vps58358 sshd\[11567\]: Invalid user aktuna from 188.166.246.46Nov  6 07:28:31 vps58358 sshd\[11567\]: Failed password for invalid user aktuna from 188.166.246.46 port 59570 ssh2
...
2019-11-06 16:06:48
178.62.12.192 attack
2019-11-06T08:02:02.631819shield sshd\[22326\]: Invalid user user from 178.62.12.192 port 38654
2019-11-06T08:02:02.635962shield sshd\[22326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.12.192
2019-11-06T08:02:04.380511shield sshd\[22326\]: Failed password for invalid user user from 178.62.12.192 port 38654 ssh2
2019-11-06T08:05:50.056386shield sshd\[22668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.12.192  user=root
2019-11-06T08:05:51.766127shield sshd\[22668\]: Failed password for root from 178.62.12.192 port 48626 ssh2
2019-11-06 16:17:11
41.76.169.43 attackspam
Nov  6 06:24:17 yesfletchmain sshd\[7011\]: Invalid user sirvine from 41.76.169.43 port 49024
Nov  6 06:24:17 yesfletchmain sshd\[7011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.169.43
Nov  6 06:24:19 yesfletchmain sshd\[7011\]: Failed password for invalid user sirvine from 41.76.169.43 port 49024 ssh2
Nov  6 06:29:11 yesfletchmain sshd\[7328\]: Invalid user amilcar from 41.76.169.43 port 60970
Nov  6 06:29:11 yesfletchmain sshd\[7328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.169.43
...
2019-11-06 15:39:24
173.245.52.177 attackbots
WEB SPAM: How to get $ 7787 per week: https://onlineuniversalwork.com/earnonebitcoinperday211764
2019-11-06 16:09:30
92.23.1.82 attackbots
Unauthorised access (Nov  6) SRC=92.23.1.82 LEN=40 TTL=243 ID=14876 DF TCP DPT=8080 WINDOW=14600 SYN
2019-11-06 16:18:54
154.117.154.34 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-06 15:46:03
80.211.133.238 attack
2019-11-06T07:01:43.198418abusebot-8.cloudsearch.cf sshd\[28246\]: Invalid user tetriandoch from 80.211.133.238 port 55422
2019-11-06 15:55:40
91.121.67.107 attackspambots
2019-11-06T07:39:54.159567shield sshd\[19418\]: Invalid user 1qazxsw@\# from 91.121.67.107 port 36494
2019-11-06T07:39:54.166105shield sshd\[19418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns300976.ip-91-121-67.eu
2019-11-06T07:39:56.274072shield sshd\[19418\]: Failed password for invalid user 1qazxsw@\# from 91.121.67.107 port 36494 ssh2
2019-11-06T07:43:37.122652shield sshd\[19900\]: Invalid user 123456 from 91.121.67.107 port 46448
2019-11-06T07:43:37.127031shield sshd\[19900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns300976.ip-91-121-67.eu
2019-11-06 15:45:02
78.46.147.205 attackbots
Nov  6 14:36:52 webhost01 sshd[18986]: Failed password for root from 78.46.147.205 port 42166 ssh2
...
2019-11-06 16:12:01
216.218.206.68 attackspam
scan z
2019-11-06 15:47:17
103.47.82.221 attackspam
Nov  6 08:53:25 legacy sshd[21087]: Failed password for root from 103.47.82.221 port 53556 ssh2
Nov  6 08:57:37 legacy sshd[21252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.47.82.221
Nov  6 08:57:38 legacy sshd[21252]: Failed password for invalid user lorenzo from 103.47.82.221 port 55036 ssh2
...
2019-11-06 15:58:12
202.28.64.1 attackspam
Nov  6 08:29:11 MK-Soft-VM7 sshd[30656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.28.64.1 
Nov  6 08:29:13 MK-Soft-VM7 sshd[30656]: Failed password for invalid user pick from 202.28.64.1 port 8028 ssh2
...
2019-11-06 16:02:09
139.59.56.121 attack
Nov  6 02:47:38 debian sshd\[12438\]: Invalid user ubuntu from 139.59.56.121 port 57978
Nov  6 02:47:38 debian sshd\[12438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.121
Nov  6 02:47:40 debian sshd\[12438\]: Failed password for invalid user ubuntu from 139.59.56.121 port 57978 ssh2
...
2019-11-06 15:52:45
88.212.1.6 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/88.212.1.6/ 
 
 SK - 1H : (2)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : SK 
 NAME ASN : ASN42841 
 
 IP : 88.212.1.6 
 
 CIDR : 88.212.0.0/18 
 
 PREFIX COUNT : 2 
 
 UNIQUE IP COUNT : 17408 
 
 
 ATTACKS DETECTED ASN42841 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-06 07:28:44 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-06 15:58:47

Recently Reported IPs

237.166.145.247 150.181.242.106 36.63.222.199 76.19.168.196
254.51.29.112 23.177.12.130 219.136.96.217 118.5.255.68
56.212.232.162 52.236.9.210 207.48.252.47 19.110.152.166
7.128.138.75 49.24.107.201 242.22.131.131 134.92.59.162
3.171.68.83 176.23.221.185 241.122.138.230 36.109.108.28