Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.135.236.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64349
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.135.236.104.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010600 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 06 22:48:16 CST 2025
;; MSG SIZE  rcvd: 108
Host info
104.236.135.145.in-addr.arpa domain name pointer 145.135.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.236.135.145.in-addr.arpa	name = 145.135.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
132.232.172.159 attackspambots
$f2bV_matches
2020-08-05 05:02:55
40.77.167.133 attack
Automatic report - Banned IP Access
2020-08-05 05:32:04
104.206.128.58 attackspambots
 TCP (SYN) 104.206.128.58:64721 -> port 5900, len 44
2020-08-05 04:57:06
51.75.121.252 attack
Failed password for root from 51.75.121.252 port 46358 ssh2
2020-08-05 05:10:59
45.119.83.68 attack
SSH bruteforce
2020-08-05 05:11:44
51.38.8.73 attackbots
10 attempts against mh-pma-try-ban on sky
2020-08-05 04:59:50
62.234.59.145 attackbotsspam
Aug  4 22:37:29 ns382633 sshd\[32165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.59.145  user=root
Aug  4 22:37:31 ns382633 sshd\[32165\]: Failed password for root from 62.234.59.145 port 60236 ssh2
Aug  4 22:40:34 ns382633 sshd\[549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.59.145  user=root
Aug  4 22:40:36 ns382633 sshd\[549\]: Failed password for root from 62.234.59.145 port 34160 ssh2
Aug  4 22:43:31 ns382633 sshd\[852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.59.145  user=root
2020-08-05 04:59:26
111.47.18.22 attackspambots
2020-08-04T10:10:59.498462hostname sshd[93021]: Failed password for root from 111.47.18.22 port 2226 ssh2
...
2020-08-05 05:15:37
180.254.39.77 attack
Telnet Server BruteForce Attack
2020-08-05 04:57:29
112.85.42.189 attackbotsspam
08/04/2020-13:57:34.693753 112.85.42.189 Protocol: 6 ET SCAN Potential SSH Scan
2020-08-05 05:17:26
45.95.168.161 attackbotsspam
SSH break in attempt
...
2020-08-05 05:29:44
167.71.254.95 attack
Aug  4 17:27:10 firewall sshd[7137]: Failed password for root from 167.71.254.95 port 41282 ssh2
Aug  4 17:30:55 firewall sshd[7945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.254.95  user=root
Aug  4 17:30:58 firewall sshd[7945]: Failed password for root from 167.71.254.95 port 52786 ssh2
...
2020-08-05 05:18:09
14.128.62.22 attackspambots
Automatic report - Banned IP Access
2020-08-05 05:18:41
177.135.103.94 attackspam
Aug  4 20:07:03 ns3042688 courier-imaps: LOGIN FAILED, method=PLAIN, ip=\[::ffff:177.135.103.94\]
...
2020-08-05 05:24:07
106.13.10.242 attackbots
Aug 04 15:30:26 askasleikir sshd[4300]: Failed password for root from 106.13.10.242 port 55668 ssh2
2020-08-05 05:12:59

Recently Reported IPs

171.207.223.181 93.18.75.99 252.17.150.137 237.79.25.17
228.153.181.233 229.25.145.154 167.249.158.109 111.253.251.223
111.253.251.229 161.182.19.209 8.226.208.161 22.155.245.26
96.231.55.29 119.7.208.59 64.94.216.197 195.103.216.164
115.173.18.157 14.247.73.38 2.186.122.87 53.197.34.221