Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.160.107.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10695
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.160.107.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 07:32:03 CST 2025
;; MSG SIZE  rcvd: 107
Host info
49.107.160.145.in-addr.arpa domain name pointer 145.160.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.107.160.145.in-addr.arpa	name = 145.160.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
138.68.95.204 attackbots
Invalid user jack from 138.68.95.204 port 48794
2020-10-03 14:33:32
128.199.95.60 attackspam
SSH login attempts.
2020-10-03 13:54:22
104.248.114.67 attackspambots
Invalid user dev from 104.248.114.67 port 59414
2020-10-03 14:04:37
202.152.1.89 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-10-03 14:34:55
138.197.175.236 attackspambots
SSH login attempts.
2020-10-03 13:50:38
45.140.207.68 attackbots
(mod_security) mod_security (id:214110) triggered by 45.140.207.68 (RU/Russia/-): 5 in the last 300 secs
2020-10-03 14:16:22
122.165.247.254 attack
Fail2Ban Ban Triggered
2020-10-03 13:57:48
64.227.19.127 attackbots
Port scan: Attack repeated for 24 hours
2020-10-03 13:56:14
71.6.146.185 attackbotsspam
404 NOT FOUND
2020-10-03 14:32:36
117.69.159.201 attackspam
Oct  3 01:09:40 srv01 postfix/smtpd\[14058\]: warning: unknown\[117.69.159.201\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  3 01:13:06 srv01 postfix/smtpd\[21628\]: warning: unknown\[117.69.159.201\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  3 01:13:17 srv01 postfix/smtpd\[21628\]: warning: unknown\[117.69.159.201\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  3 01:13:33 srv01 postfix/smtpd\[21628\]: warning: unknown\[117.69.159.201\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  3 01:13:52 srv01 postfix/smtpd\[21628\]: warning: unknown\[117.69.159.201\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-03 14:27:48
138.197.89.186 attack
 TCP (SYN) 138.197.89.186:46755 -> port 17668, len 44
2020-10-03 14:05:55
5.188.216.29 attackspambots
(mod_security) mod_security (id:210730) triggered by 5.188.216.29 (RU/Russia/-): 5 in the last 300 secs
2020-10-03 14:21:19
60.222.254.231 attackspambots
2020-10-03 00:22:47.142001-0500  localhost screensharingd[14883]: Authentication: FAILED :: User Name: N/A :: Viewer Address: 60.222.254.231 :: Type: VNC DES
2020-10-03 13:51:10
42.178.89.71 attackbotsspam
Port probing on unauthorized port 23
2020-10-03 14:27:08
183.110.223.149 attackspam
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-03 13:58:53

Recently Reported IPs

189.154.36.203 211.145.196.120 83.21.224.224 142.245.138.216
132.114.150.192 200.3.123.230 201.88.38.206 234.146.254.122
177.26.38.190 135.52.96.64 123.177.177.3 74.60.0.27
246.26.55.158 217.9.242.104 189.177.103.5 89.239.38.122
254.64.175.89 142.231.253.174 109.65.234.136 180.193.254.114