Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.144.192.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49135
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.144.192.72.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 05:54:52 CST 2025
;; MSG SIZE  rcvd: 107
Host info
72.192.144.145.in-addr.arpa domain name pointer 145.144.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.192.144.145.in-addr.arpa	name = 145.144.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.237.202.216 attack
Automatic report - Port Scan Attack
2020-02-24 18:14:25
171.244.4.45 attackspam
unauthorized connection attempt
2020-02-24 18:29:04
116.1.191.102 attack
suspicious action Mon, 24 Feb 2020 01:47:44 -0300
2020-02-24 18:24:50
58.56.191.30 attack
unauthorized connection attempt
2020-02-24 18:33:49
61.160.245.66 attack
suspicious action Mon, 24 Feb 2020 01:47:19 -0300
2020-02-24 18:32:23
221.144.61.3 attack
Feb 24 11:02:40 lnxweb62 sshd[13972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.144.61.3
Feb 24 11:02:40 lnxweb62 sshd[13972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.144.61.3
2020-02-24 18:21:22
185.97.123.12 attack
Automatic report - Port Scan Attack
2020-02-24 18:17:41
202.178.120.26 attack
Feb 24 05:48:16 server postfix/smtpd[12063]: NOQUEUE: reject: RCPT from unknown[202.178.120.26]: 554 5.7.1 Service unavailable; Client host [202.178.120.26] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/202.178.120.26; from= to= proto=SMTP helo=
2020-02-24 18:13:56
117.60.90.151 attack
Automatic report - Port Scan Attack
2020-02-24 18:11:53
46.16.121.200 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/46.16.121.200/ 
 
 CZ - 1H : (1)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CZ 
 NAME ASN : ASN44430 
 
 IP : 46.16.121.200 
 
 CIDR : 46.16.120.0/21 
 
 PREFIX COUNT : 2 
 
 UNIQUE IP COUNT : 2304 
 
 
 ATTACKS DETECTED ASN44430 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2020-02-24 05:46:44 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-02-24 18:42:31
45.248.163.109 attackspam
Unauthorised access (Feb 24) SRC=45.248.163.109 LEN=52 TTL=119 ID=27010 DF TCP DPT=445 WINDOW=8192 SYN
2020-02-24 18:41:45
138.197.221.114 attack
suspicious action Mon, 24 Feb 2020 01:48:41 -0300
2020-02-24 18:05:27
89.172.227.158 attack
Automatic report - Port Scan Attack
2020-02-24 18:33:33
176.45.220.40 attack
Automatic report - Port Scan Attack
2020-02-24 18:06:27
12.9.104.3 attackspambots
suspicious action Mon, 24 Feb 2020 01:48:17 -0300
2020-02-24 18:14:53

Recently Reported IPs

108.28.140.239 135.202.120.174 219.174.99.85 76.121.199.125
61.24.178.77 178.200.243.194 132.168.100.84 132.186.181.15
19.23.53.22 153.60.138.91 208.154.199.149 124.177.164.6
203.8.15.17 226.201.195.98 215.81.182.30 82.108.244.132
36.85.169.222 186.152.70.26 249.222.119.183 190.136.92.242