Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: SURFnet bv

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.154.52.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8807
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.154.52.90.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070601 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 07 03:32:23 CST 2019
;; MSG SIZE  rcvd: 117
Host info
90.52.154.145.in-addr.arpa domain name pointer 145.154.early-registration.of.surfnet.invalid.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
90.52.154.145.in-addr.arpa	name = 145.154.early-registration.of.surfnet.invalid.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
119.145.61.168 attackbots
port scan and connect, tcp 23 (telnet)
2019-09-26 08:37:15
177.193.122.77 attack
firewall-block, port(s): 8081/tcp
2019-09-26 09:07:48
187.189.153.7 attackbots
$f2bV_matches
2019-09-26 08:57:27
185.24.234.106 attack
Attempt to relay email through my server by using a fake mailbox name attached to my domain name.
2019-09-26 09:08:28
62.234.156.120 attackspam
Sep 26 00:46:56 hcbbdb sshd\[29946\]: Invalid user ftp1 from 62.234.156.120
Sep 26 00:46:56 hcbbdb sshd\[29946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.156.120
Sep 26 00:46:57 hcbbdb sshd\[29946\]: Failed password for invalid user ftp1 from 62.234.156.120 port 56737 ssh2
Sep 26 00:52:08 hcbbdb sshd\[30446\]: Invalid user user7 from 62.234.156.120
Sep 26 00:52:08 hcbbdb sshd\[30446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.156.120
2019-09-26 08:54:20
198.108.67.105 attack
firewall-block, port(s): 3079/tcp
2019-09-26 09:06:47
183.131.83.73 attackbotsspam
Automatic report - Banned IP Access
2019-09-26 08:58:15
153.37.2.182 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-09-26 09:08:50
18.220.56.34 attackspam
MYH,DEF GET /backup/wp-login.php
2019-09-26 08:39:36
194.61.24.46 attackbots
10 attempts against mh-pma-try-ban on beach.magehost.pro
2019-09-26 09:13:08
101.64.173.108 attackbotsspam
Unauthorised access (Sep 25) SRC=101.64.173.108 LEN=40 TTL=49 ID=61046 TCP DPT=8080 WINDOW=59638 SYN 
Unauthorised access (Sep 24) SRC=101.64.173.108 LEN=40 TTL=48 ID=62163 TCP DPT=8080 WINDOW=46490 SYN
2019-09-26 09:12:26
58.185.164.83 attackbots
$f2bV_matches
2019-09-26 08:56:56
37.114.151.203 attackbotsspam
Sep 25 15:51:20 mailman postfix/smtpd[9605]: warning: unknown[37.114.151.203]: SASL PLAIN authentication failed: authentication failure
2019-09-26 08:44:06
62.210.89.229 attackspambots
SIPVicious Scanner Detection, PTR: 62-210-89-229.rev.poneytelecom.eu.
2019-09-26 09:20:37
91.228.25.150 attackbots
19/9/25@16:51:09: FAIL: IoT-SSH address from=91.228.25.150
...
2019-09-26 08:51:29

Recently Reported IPs

207.108.153.65 62.80.181.195 110.18.152.113 97.218.176.49
88.238.14.209 69.94.159.198 163.137.238.71 85.89.126.130
222.200.33.56 120.20.112.83 105.252.135.236 12.35.98.37
60.216.195.175 153.151.26.34 179.185.30.83 108.6.244.5
121.81.231.5 105.157.211.246 203.228.127.155 87.207.184.87