Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Waalwijk

Region: North Brabant

Country: Netherlands

Internet Service Provider: KPN

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.133.81.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19019
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.133.81.72.			IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011100 1800 900 604800 86400

;; Query time: 101 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 04:50:08 CST 2020
;; MSG SIZE  rcvd: 117
Host info
72.81.133.145.in-addr.arpa domain name pointer static-145.133.81.72.ip.telfort.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.81.133.145.in-addr.arpa	name = static-145.133.81.72.ip.telfort.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.72.29.4 attack
$f2bV_matches
2019-06-25 01:36:16
2.182.57.122 attackbotsspam
IP: 2.182.57.122
ASN: AS58224 Iran Telecommunication Company PJS
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 24/06/2019 12:00:35 PM UTC
2019-06-25 02:14:56
164.132.171.6 attack
TCP Port scan. Source port 443
6.171.132.164.in-addr.arpa. 21599 IN        PTR        proxy-01.27zxc.com.
2019-06-25 01:49:56
199.16.156.165 attackspam
IP: 199.16.156.165
ASN: AS13414 Twitter Inc.
Port: Simple Mail Transfer 25
Date: 24/06/2019 12:00:34 PM UTC
2019-06-25 02:15:25
189.59.5.49 attack
Automatic report - Web App Attack
2019-06-25 02:20:03
95.27.202.115 attackbots
Unauthorized connection attempt from IP address 95.27.202.115 on Port 445(SMB)
2019-06-25 01:34:02
77.40.58.183 attackbots
$f2bV_matches
2019-06-25 01:50:15
191.53.221.109 attackspam
$f2bV_matches
2019-06-25 01:31:57
60.0.236.102 attack
:
2019-06-25 02:03:53
222.218.248.42 attackbotsspam
IMAP brute force
...
2019-06-25 01:38:03
82.231.172.71 attackbotsspam
:
2019-06-25 02:01:07
221.7.18.89 attackspam
Telnetd brute force attack detected by fail2ban
2019-06-25 02:19:02
143.215.172.84 attackspambots
Port scan on 1 port(s): 53
2019-06-25 01:38:49
58.242.83.29 attackbotsspam
Jun 24 20:06:33 core01 sshd\[15231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.242.83.29  user=root
Jun 24 20:06:35 core01 sshd\[15231\]: Failed password for root from 58.242.83.29 port 55062 ssh2
...
2019-06-25 02:14:20
185.86.79.110 attack
185.86.79.110 - - [24/Jun/2019:15:04:43 +0200] "GET /index.php?m=member&c=index&a=register&siteid=1 HTTP/1.1" 302 651
...
2019-06-25 01:41:21

Recently Reported IPs

112.204.234.235 112.255.91.243 176.130.177.15 188.241.107.98
99.187.244.53 185.77.102.244 118.24.116.145 204.92.90.23
149.168.133.103 150.253.146.242 58.221.239.212 186.28.41.62
200.97.7.170 67.182.97.168 3.232.38.219 118.217.61.52
47.108.71.194 114.109.167.48 206.105.99.64 218.130.42.138