Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.138.129.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53694
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.138.129.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021000 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 14:24:02 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 54.129.138.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.129.138.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.70.87.20 attack
Apr 28 19:27:12 sip sshd[5506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.87.20
Apr 28 19:27:13 sip sshd[5506]: Failed password for invalid user minecraft from 193.70.87.20 port 43560 ssh2
Apr 28 19:37:48 sip sshd[9366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.87.20
2020-04-29 04:33:59
177.19.34.129 attackspambots
1588075587 - 04/28/2020 14:06:27 Host: 177.19.34.129/177.19.34.129 Port: 445 TCP Blocked
2020-04-29 04:32:06
151.80.144.255 attackbotsspam
Bruteforce detected by fail2ban
2020-04-29 04:23:45
201.47.158.130 attackbotsspam
2020-04-29T04:59:57.252996vivaldi2.tree2.info sshd[17420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.47.158.130
2020-04-29T04:59:57.242997vivaldi2.tree2.info sshd[17420]: Invalid user chat from 201.47.158.130
2020-04-29T04:59:58.555485vivaldi2.tree2.info sshd[17420]: Failed password for invalid user chat from 201.47.158.130 port 51800 ssh2
2020-04-29T05:03:26.183425vivaldi2.tree2.info sshd[17766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.47.158.130  user=root
2020-04-29T05:03:27.847570vivaldi2.tree2.info sshd[17766]: Failed password for root from 201.47.158.130 port 42992 ssh2
...
2020-04-29 04:08:44
79.30.168.73 attack
Honeypot attack, port: 445, PTR: host73-168-dynamic.30-79-r.retail.telecomitalia.it.
2020-04-29 04:34:58
123.207.185.54 attackbotsspam
Invalid user walter from 123.207.185.54 port 40756
2020-04-29 04:05:32
190.94.151.212 attackbotsspam
Unauthorized connection attempt detected from IP address 190.94.151.212 to port 2004
2020-04-29 04:40:27
88.241.96.97 attackbots
Automatic report - Port Scan Attack
2020-04-29 04:28:43
37.252.80.57 attackspam
1588075594 - 04/28/2020 14:06:34 Host: 37.252.80.57/37.252.80.57 Port: 445 TCP Blocked
2020-04-29 04:26:42
113.53.29.172 attackbotsspam
Apr 28 14:30:00 rotator sshd\[1916\]: Invalid user dean from 113.53.29.172Apr 28 14:30:02 rotator sshd\[1916\]: Failed password for invalid user dean from 113.53.29.172 port 37830 ssh2Apr 28 14:33:49 rotator sshd\[2728\]: Invalid user mzy from 113.53.29.172Apr 28 14:33:52 rotator sshd\[2728\]: Failed password for invalid user mzy from 113.53.29.172 port 38468 ssh2Apr 28 14:37:43 rotator sshd\[3533\]: Invalid user train1 from 113.53.29.172Apr 28 14:37:46 rotator sshd\[3533\]: Failed password for invalid user train1 from 113.53.29.172 port 39108 ssh2
...
2020-04-29 04:13:54
202.152.0.14 attackspam
Apr 28 13:49:20 server1 sshd\[4202\]: Failed password for invalid user ocs from 202.152.0.14 port 55230 ssh2
Apr 28 13:52:07 server1 sshd\[5057\]: Invalid user john from 202.152.0.14
Apr 28 13:52:07 server1 sshd\[5057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.152.0.14 
Apr 28 13:52:09 server1 sshd\[5057\]: Failed password for invalid user john from 202.152.0.14 port 58558 ssh2
Apr 28 13:54:48 server1 sshd\[5928\]: Invalid user student from 202.152.0.14
...
2020-04-29 04:15:30
178.253.12.66 attack
Unauthorized connection attempt detected from IP address 178.253.12.66 to port 445
2020-04-29 04:44:01
175.141.247.190 attackspambots
$f2bV_matches
2020-04-29 04:29:33
139.59.129.45 attackbotsspam
Apr 28 21:34:57 sxvn sshd[470868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.129.45
2020-04-29 04:28:26
171.220.243.179 attackbotsspam
Apr 28 16:03:27 server sshd[30121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.220.243.179
Apr 28 16:03:29 server sshd[30121]: Failed password for invalid user usuario1 from 171.220.243.179 port 55686 ssh2
Apr 28 16:08:35 server sshd[30696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.220.243.179
...
2020-04-29 04:09:26

Recently Reported IPs

253.202.181.127 38.122.110.119 100.62.245.160 179.110.51.219
97.220.233.132 12.55.39.191 244.193.86.102 251.48.104.166
58.129.32.185 67.115.54.151 226.155.240.85 166.42.144.193
92.20.104.47 215.120.224.120 132.229.102.109 21.104.64.152
61.49.105.122 147.233.134.174 62.195.196.172 109.112.176.150