Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.157.113.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63347
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.157.113.114.		IN	A

;; AUTHORITY SECTION:
.			160	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081000 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Aug 10 14:50:04 CST 2020
;; MSG SIZE  rcvd: 119
Host info
114.113.157.145.in-addr.arpa domain name pointer 145.157.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.113.157.145.in-addr.arpa	name = 145.157.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
71.237.171.150 attackspambots
Invalid user ksgdb from 71.237.171.150 port 34716
2019-08-03 01:36:19
90.151.122.32 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-03 01:51:21
45.23.69.109 attackbots
blogonese.net 45.23.69.109 \[02/Aug/2019:10:39:45 +0200\] "POST /wp-login.php HTTP/1.1" 200 5771 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
blogonese.net 45.23.69.109 \[02/Aug/2019:10:39:46 +0200\] "POST /wp-login.php HTTP/1.1" 200 5731 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-08-03 01:20:30
196.52.43.126 attackspam
Automatic report - Port Scan Attack
2019-08-03 01:24:02
219.73.114.232 attackbots
Honeypot attack, port: 5555, PTR: n219073114232.netvigator.com.
2019-08-03 01:44:28
60.10.70.230 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-03 02:11:06
151.0.51.72 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-03 02:03:35
187.87.9.227 attackspam
Aug  2 03:38:31 mailman postfix/smtpd[28670]: warning: unknown[187.87.9.227]: SASL PLAIN authentication failed: authentication failure
2019-08-03 02:07:13
190.197.76.1 attackbotsspam
Received: from tw.formosacpa.com.tw (tw.formosacpa.com.tw [59.124.95.218])
Thu, 1 Aug 2019 22:19:11 +0200 (CEST)
Received: from tw.formosacpa.com.tw (unknown [190.197.76.1])	
by tw.formosacpa.com.tw (Postfix)
2019-08-03 01:19:09
162.158.6.22 attackspambots
Scan for word-press application/login
2019-08-03 02:15:24
78.187.193.74 attackspam
Honeypot attack, port: 23, PTR: 78.187.193.74.dynamic.ttnet.com.tr.
2019-08-03 02:12:51
119.60.255.90 attack
SSH Brute-Force attacks
2019-08-03 01:39:15
220.181.108.93 attackspambots
Bad bot/spoofed identity
2019-08-03 01:56:41
37.194.226.134 attackspambots
Automatic report
2019-08-03 00:42:01
42.112.64.96 attack
Unauthorised access (Aug  2) SRC=42.112.64.96 LEN=56 TTL=110 ID=18098 DF TCP DPT=445 WINDOW=8192 SYN
2019-08-03 01:49:46

Recently Reported IPs

192.3.73.158 177.140.76.164 45.65.241.42 42.177.171.31
31.129.52.198 1.161.88.1 49.69.51.100 122.210.234.9
34.214.83.12 168.196.149.13 41.216.183.160 31.129.47.167
185.236.23.151 121.32.50.175 180.116.206.94 85.105.61.59
194.15.36.96 193.27.14.206 41.216.180.184 245.167.81.88