Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.134.123.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44604
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.134.123.244.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 15:34:55 CST 2025
;; MSG SIZE  rcvd: 108
Host info
244.123.134.145.in-addr.arpa domain name pointer 145.134.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
244.123.134.145.in-addr.arpa	name = 145.134.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.119.160.143 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-10-28 07:27:37
106.13.81.162 attackbots
$f2bV_matches
2019-10-28 06:58:11
173.56.69.86 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-28 07:20:46
159.203.201.32 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 8983 proto: TCP cat: Misc Attack
2019-10-28 07:23:34
102.177.145.221 attack
Oct 28 00:52:57 www sshd\[100386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.177.145.221  user=root
Oct 28 00:52:59 www sshd\[100386\]: Failed password for root from 102.177.145.221 port 34834 ssh2
Oct 28 00:57:35 www sshd\[100454\]: Invalid user scp from 102.177.145.221
Oct 28 00:57:35 www sshd\[100454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.177.145.221
...
2019-10-28 07:02:29
86.110.234.31 attackbots
Brute forcing RDP port 3389
2019-10-28 06:56:27
92.63.194.148 attack
Multiport scan : 7 ports scanned 22303 22304 22305 31242 59050 59051 59052
2019-10-28 07:28:10
77.247.110.173 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-10-28 07:11:45
159.203.201.114 attack
ET DROP Dshield Block Listed Source group 1 - port: 9030 proto: TCP cat: Misc Attack
2019-10-28 07:23:07
218.56.41.228 attackbots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-28 07:13:11
113.57.194.148 attackbotsspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-28 07:24:57
185.175.93.3 attack
Multiport scan : 6 ports scanned 3366 3386 3387 3388 3486 6743
2019-10-28 07:19:29
92.119.160.97 attack
10/27/2019-19:16:01.918007 92.119.160.97 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-28 07:27:57
89.248.168.202 attack
10/28/2019-00:27:31.541276 89.248.168.202 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-28 07:30:08
195.231.67.105 attackbotsspam
Oct 27 23:23:57 SilenceServices sshd[1283]: Failed password for root from 195.231.67.105 port 49856 ssh2
Oct 27 23:27:54 SilenceServices sshd[5652]: Failed password for root from 195.231.67.105 port 33606 ssh2
2019-10-28 06:58:40

Recently Reported IPs

229.198.234.127 60.145.199.73 134.49.208.225 53.59.60.49
230.130.139.24 154.202.206.31 82.58.199.111 107.225.15.16
214.123.254.206 127.225.130.216 15.0.175.13 104.241.23.94
166.59.225.137 101.120.168.1 47.226.9.153 52.18.150.192
128.142.145.208 91.182.4.210 116.183.132.79 242.134.10.77