Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hoogezand

Region: Groningen

Country: Netherlands

Internet Service Provider: KPN

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.133.202.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14872
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.133.202.16.			IN	A

;; AUTHORITY SECTION:
.			407	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030300 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 04 05:26:47 CST 2020
;; MSG SIZE  rcvd: 118
Host info
16.202.133.145.in-addr.arpa domain name pointer static-145.133.202.16.ip.telfort.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
16.202.133.145.in-addr.arpa	name = static-145.133.202.16.ip.telfort.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.156.73.52 attack
11/10/2019-19:51:39.439191 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-11 08:52:52
103.218.242.10 attackspam
The IP address [103.218.242.10] experienced 5 failed attempts when attempting to log into SSH
2019-11-11 08:49:55
96.1.72.4 attackspambots
Nov 11 00:54:45 XXX sshd[34643]: Invalid user ofsaa from 96.1.72.4 port 33538
2019-11-11 09:05:33
14.63.174.149 attackbotsspam
Nov 11 05:55:18 vps666546 sshd\[32070\]: Invalid user netter from 14.63.174.149 port 43194
Nov 11 05:55:18 vps666546 sshd\[32070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.174.149
Nov 11 05:55:20 vps666546 sshd\[32070\]: Failed password for invalid user netter from 14.63.174.149 port 43194 ssh2
Nov 11 05:59:30 vps666546 sshd\[32183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.174.149  user=root
Nov 11 05:59:32 vps666546 sshd\[32183\]: Failed password for root from 14.63.174.149 port 33458 ssh2
...
2019-11-11 13:01:33
152.32.130.99 attackspambots
Unauthorized SSH login attempts
2019-11-11 09:14:17
200.92.226.26 attack
slow and persistent scanner
2019-11-11 08:55:41
183.82.100.141 attackspambots
Nov 10 23:59:24 plusreed sshd[16173]: Invalid user sajani from 183.82.100.141
...
2019-11-11 13:04:48
2.228.39.100 attack
Unauthorized connection attempt from IP address 2.228.39.100 on Port 445(SMB)
2019-11-11 08:41:45
195.29.105.125 attackbots
" "
2019-11-11 09:01:10
162.241.192.241 attackbots
Nov 11 00:41:52 game-panel sshd[27045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.192.241
Nov 11 00:41:54 game-panel sshd[27045]: Failed password for invalid user server from 162.241.192.241 port 44708 ssh2
Nov 11 00:45:36 game-panel sshd[27156]: Failed password for root from 162.241.192.241 port 54108 ssh2
2019-11-11 08:56:12
222.252.119.76 attack
Invalid user admin from 222.252.119.76 port 34818
2019-11-11 09:10:43
139.59.95.125 attack
Invalid user teamspeak3 from 139.59.95.125 port 35110
2019-11-11 09:14:44
51.75.52.127 attackbotsspam
11/11/2019-01:00:08.152657 51.75.52.127 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 52
2019-11-11 09:06:21
109.87.141.136 attackbots
Spamassassin_109.87.141.136
2019-11-11 08:59:15
178.33.122.173 attack
Attempted to connect 3 times to port 80 TCP
2019-11-11 09:00:33

Recently Reported IPs

184.168.193.117 181.169.171.30 220.43.145.54 77.103.169.125
155.229.230.157 89.69.55.6 187.75.148.43 183.230.28.23
182.68.187.86 105.145.113.217 72.199.120.240 95.18.83.116
165.22.14.169 173.203.185.178 109.137.130.238 41.226.25.4
2.41.80.175 89.64.144.97 141.209.211.206 176.102.48.105