Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.158.81.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13385
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.158.81.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:43:57 CST 2025
;; MSG SIZE  rcvd: 106
Host info
42.81.158.145.in-addr.arpa domain name pointer 145.158.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.81.158.145.in-addr.arpa	name = 145.158.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
197.61.133.88 attackspambots
1598819843 - 08/30/2020 22:37:23 Host: 197.61.133.88/197.61.133.88 Port: 23 TCP Blocked
2020-08-31 05:19:16
193.124.191.92 attackbotsspam
Automated report (2020-08-31T04:37:05+08:00). Faked user agent detected.
2020-08-31 05:34:42
120.53.243.163 attackbots
Invalid user ict from 120.53.243.163 port 52176
2020-08-31 05:37:55
15.164.40.8 attack
25311/tcp
[2020-08-30]1pkt
2020-08-31 05:20:50
152.231.140.150 attackspam
$f2bV_matches
2020-08-31 05:38:39
103.145.13.144 attackspam
Firewall Dropped Connection
2020-08-31 05:12:35
222.186.42.213 attackbotsspam
Aug 30 23:04:08 v22018053744266470 sshd[30623]: Failed password for root from 222.186.42.213 port 23061 ssh2
Aug 30 23:04:25 v22018053744266470 sshd[30642]: Failed password for root from 222.186.42.213 port 43644 ssh2
...
2020-08-31 05:13:11
78.144.185.29 attackspam
Wordpress attack
2020-08-31 05:45:50
185.58.219.42 attackspam
445/tcp
[2020-08-30]1pkt
2020-08-31 05:51:42
150.109.104.153 attackspam
Aug 30 23:19:28 lnxmysql61 sshd[5134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.104.153
2020-08-31 05:31:47
115.159.152.188 attack
Invalid user oracle from 115.159.152.188 port 33352
2020-08-31 05:18:33
217.219.81.146 attackbotsspam
445/tcp
[2020-08-30]1pkt
2020-08-31 05:15:22
67.205.141.165 attackspam
various attack
2020-08-31 05:25:14
157.34.86.65 attack
445/tcp
[2020-08-30]1pkt
2020-08-31 05:30:59
51.68.191.236 attack
23/tcp
[2020-08-30]1pkt
2020-08-31 05:33:08

Recently Reported IPs

248.215.150.108 145.76.37.229 49.121.101.192 202.73.114.192
15.214.206.219 7.158.155.125 181.15.36.245 107.36.207.24
9.92.180.231 231.147.13.119 134.68.152.36 172.6.165.253
126.32.101.36 99.152.239.47 152.26.28.216 251.35.32.141
90.239.109.80 146.180.13.79 225.14.159.77 81.38.43.150