Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.159.145.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34546
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.159.145.41.			IN	A

;; AUTHORITY SECTION:
.			484	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 14:28:56 CST 2022
;; MSG SIZE  rcvd: 107
Host info
41.145.159.145.in-addr.arpa domain name pointer 145.159.early-registration.of.surfnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.145.159.145.in-addr.arpa	name = 145.159.early-registration.of.surfnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
205.185.113.140 attackbots
Invalid user user1 from 205.185.113.140 port 33004
2020-01-23 14:51:45
153.150.32.67 attackbotsspam
Triggered by Fail2Ban at Ares web server
2020-01-23 15:24:35
198.54.116.118 attackspambots
IDENTITY THEFT ATTEMPT FRAUD FROM SBY-TELECOM.INFO WITH A ORIGINATING EMAIL FROM OCN.AD.JP OF info@hokuetsushokan.com  AND A REPLY TO EMAIL ADDRESS AT COPR.MAIL.RU OF info@shuaa-creditcorp.ru
2020-01-23 15:21:21
221.235.184.78 attack
Unauthorized connection attempt detected from IP address 221.235.184.78 to port 3390 [J]
2020-01-23 14:57:56
82.117.212.114 attackbotsspam
proto=tcp  .  spt=54326  .  dpt=25  .     Found on   Dark List de      (345)
2020-01-23 15:21:34
94.41.206.89 attackbots
Unauthorised access (Jan 22) SRC=94.41.206.89 LEN=52 TTL=120 ID=2428 DF TCP DPT=1433 WINDOW=8192 SYN
2020-01-23 15:32:23
118.184.32.7 attackspam
RUSSIAN PORN SPAM !
2020-01-23 15:33:49
185.176.27.90 attackspambots
firewall-block, port(s): 7710/tcp, 40810/tcp
2020-01-23 15:07:14
179.107.111.106 attackspam
Unauthorized connection attempt detected from IP address 179.107.111.106 to port 2220 [J]
2020-01-23 15:01:58
112.85.42.176 attackspam
Jan 23 07:29:36 meumeu sshd[11280]: Failed password for root from 112.85.42.176 port 57022 ssh2
Jan 23 07:29:41 meumeu sshd[11280]: Failed password for root from 112.85.42.176 port 57022 ssh2
Jan 23 07:29:45 meumeu sshd[11280]: Failed password for root from 112.85.42.176 port 57022 ssh2
Jan 23 07:29:48 meumeu sshd[11280]: Failed password for root from 112.85.42.176 port 57022 ssh2
...
2020-01-23 15:07:52
101.109.146.192 attack
Jan 23 04:17:09 dcd-gentoo sshd[5427]: Invalid user any from 101.109.146.192 port 55822
Jan 23 04:17:10 dcd-gentoo sshd[5433]: Invalid user any from 101.109.146.192 port 55947
Jan 23 04:17:12 dcd-gentoo sshd[5436]: Invalid user any from 101.109.146.192 port 56136
...
2020-01-23 15:09:46
27.154.242.142 attack
Invalid user fi from 27.154.242.142 port 54738
2020-01-23 15:22:05
159.89.144.7 attackbots
WordPress login Brute force / Web App Attack on client site.
2020-01-23 14:58:39
71.6.147.254 attackbotsspam
Unauthorized connection attempt detected from IP address 71.6.147.254 to port 2067 [J]
2020-01-23 15:10:24
178.71.209.145 attackspam
proto=tcp  .  spt=51449  .  dpt=25  .     Found on   Blocklist de       (346)
2020-01-23 15:20:23

Recently Reported IPs

12.213.229.49 15.181.247.162 113.45.187.5 166.229.241.216
142.201.131.242 22.0.91.246 205.181.101.64 118.116.148.103
147.149.12.71 216.37.225.119 177.124.235.114 160.2.21.114
102.203.193.128 18.253.199.179 114.49.177.37 25.45.139.234
142.252.34.139 197.97.130.179 166.211.56.234 172.216.81.202