Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: SURFnet bv

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.145.11.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36571
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.145.11.5.			IN	A

;; AUTHORITY SECTION:
.			3229	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071000 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 11 02:38:21 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 5.11.145.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 5.11.145.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.58.180.83 attack
Jun  2 06:17:19 inter-technics sshd[25434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.58.180.83  user=root
Jun  2 06:17:21 inter-technics sshd[25434]: Failed password for root from 106.58.180.83 port 59186 ssh2
Jun  2 06:20:20 inter-technics sshd[25624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.58.180.83  user=root
Jun  2 06:20:22 inter-technics sshd[25624]: Failed password for root from 106.58.180.83 port 42756 ssh2
Jun  2 06:23:26 inter-technics sshd[25925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.58.180.83  user=root
Jun  2 06:23:28 inter-technics sshd[25925]: Failed password for root from 106.58.180.83 port 54556 ssh2
...
2020-06-02 17:43:23
106.12.205.237 attackspam
Jun  2 07:31:42 home sshd[18348]: Failed password for root from 106.12.205.237 port 50446 ssh2
Jun  2 07:32:58 home sshd[18500]: Failed password for root from 106.12.205.237 port 36620 ssh2
...
2020-06-02 17:28:14
51.255.9.160 attackspambots
Jun  2 07:16:31 home sshd[16756]: Failed password for root from 51.255.9.160 port 38760 ssh2
Jun  2 07:19:52 home sshd[17079]: Failed password for root from 51.255.9.160 port 49252 ssh2
...
2020-06-02 17:31:28
161.35.103.140 attack
SSH/22 MH Probe, BF, Hack -
2020-06-02 17:23:15
51.77.109.98 attack
2020-06-02T04:37:42.785881abusebot-2.cloudsearch.cf sshd[11877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.109.98  user=root
2020-06-02T04:37:44.757504abusebot-2.cloudsearch.cf sshd[11877]: Failed password for root from 51.77.109.98 port 33324 ssh2
2020-06-02T04:39:38.448082abusebot-2.cloudsearch.cf sshd[11887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.109.98  user=root
2020-06-02T04:39:40.008628abusebot-2.cloudsearch.cf sshd[11887]: Failed password for root from 51.77.109.98 port 58194 ssh2
2020-06-02T04:41:33.474502abusebot-2.cloudsearch.cf sshd[11898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.109.98  user=root
2020-06-02T04:41:35.491400abusebot-2.cloudsearch.cf sshd[11898]: Failed password for root from 51.77.109.98 port 54832 ssh2
2020-06-02T04:43:25.348694abusebot-2.cloudsearch.cf sshd[11908]: pam_unix(sshd:auth): authenticat
...
2020-06-02 17:54:01
106.12.190.254 attackbots
Jun  2 06:51:34 minden010 sshd[21521]: Failed password for root from 106.12.190.254 port 39026 ssh2
Jun  2 06:55:41 minden010 sshd[23558]: Failed password for root from 106.12.190.254 port 39282 ssh2
...
2020-06-02 17:24:59
51.75.122.213 attackbots
2020-06-01 UTC: (48x) - root(48x)
2020-06-02 17:41:45
121.69.89.78 attackbotsspam
Jun  2 04:18:39 Tower sshd[29314]: Connection from 121.69.89.78 port 46542 on 192.168.10.220 port 22 rdomain ""
Jun  2 04:18:41 Tower sshd[29314]: Failed password for root from 121.69.89.78 port 46542 ssh2
Jun  2 04:18:41 Tower sshd[29314]: Received disconnect from 121.69.89.78 port 46542:11: Bye Bye [preauth]
Jun  2 04:18:41 Tower sshd[29314]: Disconnected from authenticating user root 121.69.89.78 port 46542 [preauth]
2020-06-02 17:42:57
106.12.192.129 attackspam
Jun  2 11:05:35 piServer sshd[20829]: Failed password for root from 106.12.192.129 port 53234 ssh2
Jun  2 11:07:34 piServer sshd[21026]: Failed password for root from 106.12.192.129 port 42812 ssh2
...
2020-06-02 17:17:41
94.103.82.192 attackbots
SSH Scan
2020-06-02 17:17:56
27.72.82.54 attackbots
Dovecot Invalid User Login Attempt.
2020-06-02 17:40:36
139.59.57.64 attackbotsspam
139.59.57.64 - - [02/Jun/2020:09:54:11 +0100] "POST /wp-login.php HTTP/1.1" 200 1875 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.57.64 - - [02/Jun/2020:09:54:15 +0100] "POST /wp-login.php HTTP/1.1" 200 1860 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.57.64 - - [02/Jun/2020:09:54:17 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-02 17:52:26
167.172.153.137 attack
$f2bV_matches
2020-06-02 17:55:46
36.232.101.226 attackspam
Honeypot attack, port: 5555, PTR: 36-232-101-226.dynamic-ip.hinet.net.
2020-06-02 17:51:47
118.25.152.169 attack
Jun  2 05:44:45 nextcloud sshd\[28074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.152.169  user=root
Jun  2 05:44:47 nextcloud sshd\[28074\]: Failed password for root from 118.25.152.169 port 33974 ssh2
Jun  2 05:47:43 nextcloud sshd\[32197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.152.169  user=root
2020-06-02 17:51:59

Recently Reported IPs

79.247.9.193 86.168.141.22 44.20.186.229 193.218.97.144
178.172.221.25 99.39.159.51 157.230.36.137 213.8.119.95
74.8.140.210 177.13.33.37 130.236.84.177 49.79.186.209
23.100.70.161 116.14.252.31 67.207.84.240 193.79.147.110
176.133.201.159 94.230.194.58 177.38.188.115 150.254.160.210