Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.158.40.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44032
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.158.40.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 19:00:50 CST 2025
;; MSG SIZE  rcvd: 107
Host info
148.40.158.145.in-addr.arpa domain name pointer 145.158.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.40.158.145.in-addr.arpa	name = 145.158.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.178.203.94 attackspambots
445/tcp 445/tcp 445/tcp
[2019-08-02]3pkt
2019-08-03 06:54:00
100.43.91.102 attackbots
EventTime:Sat Aug 3 05:27:01 AEST 2019,Protocol:TCP,VendorEventCode:RT_FLOW_SESSION_DENY,TargetPort:81,SourceIP:100.43.91.102,SourcePort:56777
2019-08-03 06:13:53
58.218.201.47 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-03 06:42:14
125.231.83.220 attackbots
" "
2019-08-03 06:54:53
181.40.66.179 attack
ssh failed login
2019-08-03 06:33:29
117.93.23.252 attackbots
leo_www
2019-08-03 06:24:54
150.165.67.34 attack
2019-08-02T22:02:29.524899abusebot-5.cloudsearch.cf sshd\[21292\]: Invalid user hr from 150.165.67.34 port 49042
2019-08-03 06:12:10
89.108.84.218 attackbots
445/tcp
[2019-08-02]1pkt
2019-08-03 06:56:08
111.61.100.67 attackbotsspam
22/tcp 22/tcp
[2019-08-02]2pkt
2019-08-03 06:41:47
123.206.217.59 attackspambots
Aug  2 21:26:45 fr01 sshd[13842]: Invalid user dario from 123.206.217.59
...
2019-08-03 06:27:26
66.42.53.133 attackspambots
66.42.53.133 - - [02/Aug/2019:21:26:09 +0200] "POST /wp-login.php HTTP/1.1" 403 1598 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-" f2d0db1c7551a8554cfe74cf11347a6a United States US California Hawthorne 
66.42.53.133 - - [02/Aug/2019:21:26:11 +0200] "POST /wp-login.php HTTP/1.1" 403 1606 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-" ee1ce41d77bf5c5c267027069a9b88a8 United States US California Hawthorne 
...
2019-08-03 06:48:24
122.114.46.120 attackspambots
Aug  2 20:28:18 MK-Soft-VM3 sshd\[2567\]: Invalid user www01 from 122.114.46.120 port 55648
Aug  2 20:28:18 MK-Soft-VM3 sshd\[2567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.46.120
Aug  2 20:28:20 MK-Soft-VM3 sshd\[2567\]: Failed password for invalid user www01 from 122.114.46.120 port 55648 ssh2
...
2019-08-03 06:24:26
197.253.6.249 attackspam
2019-08-02T22:39:00.072061abusebot-2.cloudsearch.cf sshd\[24826\]: Invalid user iroda from 197.253.6.249 port 50763
2019-08-03 06:40:39
177.135.43.32 attackspambots
Automatic report - Port Scan Attack
2019-08-03 06:34:03
36.69.203.129 attackspambots
445/tcp
[2019-08-02]1pkt
2019-08-03 06:47:31

Recently Reported IPs

36.222.230.4 59.36.61.110 46.148.44.200 216.184.243.34
54.187.77.30 245.98.76.133 170.161.36.112 152.94.114.189
43.120.188.4 59.18.107.237 24.148.80.223 48.16.151.128
160.169.62.113 249.46.157.101 98.148.61.103 100.214.252.42
69.97.105.102 53.248.229.130 136.96.226.160 87.44.133.140