Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.136.231.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10321
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.136.231.55.			IN	A

;; AUTHORITY SECTION:
.			491	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 11:51:03 CST 2022
;; MSG SIZE  rcvd: 107
Host info
55.231.136.145.in-addr.arpa domain name pointer dhcp-145.136.231.55.pool.hsleiden.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.231.136.145.in-addr.arpa	name = dhcp-145.136.231.55.pool.hsleiden.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
110.50.85.28 attack
Invalid user tc from 110.50.85.28 port 35688
2020-07-19 00:37:43
104.45.88.60 attack
Invalid user bryan from 104.45.88.60 port 42276
2020-07-19 00:39:44
148.70.102.69 attackbots
Jul 18 17:38:09 mailserver sshd\[32651\]: Invalid user ubuntu from 148.70.102.69
...
2020-07-19 00:30:16
103.114.107.143 attack
Invalid user z from 103.114.107.143 port 53160
2020-07-19 00:40:36
165.227.182.136 attackspambots
Brute-force attempt banned
2020-07-19 01:06:22
104.248.237.70 attackbots
Fail2Ban - SSH Bruteforce Attempt
2020-07-19 00:38:49
51.75.66.92 attackbots
2020-07-18T16:31:22.093746shield sshd\[32707\]: Invalid user james from 51.75.66.92 port 36152
2020-07-18T16:31:22.104782shield sshd\[32707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.ip-51-75-66.eu
2020-07-18T16:31:23.758263shield sshd\[32707\]: Failed password for invalid user james from 51.75.66.92 port 36152 ssh2
2020-07-18T16:36:52.196905shield sshd\[2157\]: Invalid user frank from 51.75.66.92 port 54582
2020-07-18T16:36:52.205388shield sshd\[2157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.ip-51-75-66.eu
2020-07-19 00:47:18
185.220.102.249 attack
prod8
...
2020-07-19 01:01:29
54.39.16.73 attack
SSH Brute-Force attacks
2020-07-19 00:46:07
191.162.214.172 attackspam
Invalid user admin from 191.162.214.172 port 54298
2020-07-19 01:00:00
179.154.56.227 attackbots
Invalid user mexico from 179.154.56.227 port 46997
2020-07-19 00:25:49
34.80.126.142 attack
Invalid user admin from 34.80.126.142 port 41938
2020-07-19 00:51:06
36.94.100.74 attackspambots
DATE:2020-07-18 18:37:34,IP:36.94.100.74,MATCHES:10,PORT:ssh
2020-07-19 00:49:50
180.250.124.227 attackspam
Fail2Ban
2020-07-19 00:25:02
191.232.242.173 attackspam
Invalid user jenkins from 191.232.242.173 port 42042
2020-07-19 00:59:32

Recently Reported IPs

64.224.136.156 249.112.66.201 107.78.186.129 253.182.133.213
253.99.240.200 136.137.28.199 23.172.124.59 5.7.200.239
126.78.84.23 134.166.51.48 66.240.231.19 41.76.3.200
208.40.173.1 142.143.249.99 58.130.255.213 192.80.240.171
77.60.52.129 152.217.105.51 169.52.10.93 75.107.167.233