Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.156.239.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1535
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.156.239.147.		IN	A

;; AUTHORITY SECTION:
.			487	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051600 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 17 01:06:53 CST 2022
;; MSG SIZE  rcvd: 108
Host info
147.239.156.145.in-addr.arpa domain name pointer 145.156.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
147.239.156.145.in-addr.arpa	name = 145.156.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.204.210.40 attackspambots
$f2bV_matches
2019-11-15 03:36:54
193.56.28.121 attackbots
Nov 14 19:49:55 herz-der-gamer postfix/smtpd[18015]: warning: unknown[193.56.28.121]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-15 03:44:43
82.200.212.178 attackbotsspam
Unauthorized IMAP connection attempt
2019-11-15 03:32:56
106.12.77.212 attack
Automatic report - Banned IP Access
2019-11-15 03:18:01
51.68.70.72 attackbotsspam
Nov 14 14:34:24 *** sshd[26090]: Invalid user guest from 51.68.70.72
2019-11-15 03:32:12
45.143.221.9 attackspambots
ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak
2019-11-15 03:15:50
186.10.64.2 attackbots
Nov 14 15:28:58 MK-Soft-Root2 sshd[9066]: Failed password for root from 186.10.64.2 port 56420 ssh2
...
2019-11-15 03:56:36
111.231.219.142 attackbotsspam
(sshd) Failed SSH login from 111.231.219.142 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 14 16:05:17 s1 sshd[22122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.219.142  user=root
Nov 14 16:05:19 s1 sshd[22122]: Failed password for root from 111.231.219.142 port 57364 ssh2
Nov 14 16:27:56 s1 sshd[22908]: Invalid user www-sftp-shared from 111.231.219.142 port 53585
Nov 14 16:27:58 s1 sshd[22908]: Failed password for invalid user www-sftp-shared from 111.231.219.142 port 53585 ssh2
Nov 14 16:34:09 s1 sshd[23108]: Invalid user postgres from 111.231.219.142 port 43729
2019-11-15 03:43:27
149.56.16.168 attackbots
Nov 14 17:15:21 game-panel sshd[26307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.16.168
Nov 14 17:15:24 game-panel sshd[26307]: Failed password for invalid user auensen from 149.56.16.168 port 55242 ssh2
Nov 14 17:19:02 game-panel sshd[26415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.16.168
2019-11-15 03:48:23
92.38.21.117 attackspam
Automatic report - Port Scan Attack
2019-11-15 03:53:46
148.66.135.178 attackbotsspam
Nov 14 20:08:57 markkoudstaal sshd[11083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.135.178
Nov 14 20:08:59 markkoudstaal sshd[11083]: Failed password for invalid user midawi from 148.66.135.178 port 43354 ssh2
Nov 14 20:13:14 markkoudstaal sshd[11513]: Failed password for root from 148.66.135.178 port 52960 ssh2
2019-11-15 03:26:40
82.196.4.66 attackspam
SSH bruteforce (Triggered fail2ban)
2019-11-15 03:50:39
134.209.178.109 attackbotsspam
$f2bV_matches
2019-11-15 03:24:01
118.24.210.86 attack
Nov 14 21:37:45 server sshd\[11973\]: Invalid user baldermann from 118.24.210.86
Nov 14 21:37:45 server sshd\[11973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.210.86 
Nov 14 21:37:47 server sshd\[11973\]: Failed password for invalid user baldermann from 118.24.210.86 port 47471 ssh2
Nov 14 21:55:27 server sshd\[16736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.210.86  user=apache
Nov 14 21:55:30 server sshd\[16736\]: Failed password for apache from 118.24.210.86 port 39459 ssh2
...
2019-11-15 03:35:48
223.97.19.134 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-15 03:44:02

Recently Reported IPs

104.18.34.30 91.154.59.1 30.151.94.211 101.123.64.2
163.25.111.125 59.24.132.98 228.90.202.113 209.124.69.39
124.139.45.184 210.193.252.140 138.36.78.171 197.157.29.237
89.118.190.27 97.4.144.2 159.224.220.54 31.23.127.89
49.188.215.72 228.220.248.244 125.111.139.202 64.119.148.159