Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.161.207.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32810
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.161.207.4.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:20:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
4.207.161.145.in-addr.arpa domain name pointer 145.161.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.207.161.145.in-addr.arpa	name = 145.161.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
142.234.39.37 attack
08/19/2019-15:35:03.719184 142.234.39.37 Protocol: 6 ET SCAN Potential SSH Scan
2019-08-20 03:36:03
159.192.235.232 attackbotsspam
Automatic report - Port Scan Attack
2019-08-20 03:39:55
186.5.109.211 attackspambots
Aug 19 19:32:43 web8 sshd\[9440\]: Invalid user password from 186.5.109.211
Aug 19 19:32:43 web8 sshd\[9440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.5.109.211
Aug 19 19:32:45 web8 sshd\[9440\]: Failed password for invalid user password from 186.5.109.211 port 31961 ssh2
Aug 19 19:37:42 web8 sshd\[11804\]: Invalid user attilafute from 186.5.109.211
Aug 19 19:37:42 web8 sshd\[11804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.5.109.211
2019-08-20 03:50:51
142.234.39.36 attackspambots
SSHScan
2019-08-20 03:30:42
206.189.108.59 attack
2019-08-20T02:25:38.859691enmeeting.mahidol.ac.th sshd\[1586\]: User halt from 206.189.108.59 not allowed because not listed in AllowUsers
2019-08-20T02:25:38.878385enmeeting.mahidol.ac.th sshd\[1586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.108.59  user=halt
2019-08-20T02:25:41.073667enmeeting.mahidol.ac.th sshd\[1586\]: Failed password for invalid user halt from 206.189.108.59 port 42768 ssh2
...
2019-08-20 03:39:26
139.199.25.110 attackspambots
Aug 19 20:58:23 * sshd[15563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.25.110
Aug 19 20:58:25 * sshd[15563]: Failed password for invalid user user from 139.199.25.110 port 51080 ssh2
2019-08-20 03:50:17
58.16.78.136 attackspambots
[Aegis] @ 2019-08-19 19:58:52  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-08-20 03:17:37
62.127.106.82 attackbots
Aug 19 13:58:45 aat-srv002 sshd[22261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.127.106.82
Aug 19 13:58:47 aat-srv002 sshd[22261]: Failed password for invalid user admin from 62.127.106.82 port 34013 ssh2
Aug 19 13:59:06 aat-srv002 sshd[22264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.127.106.82
Aug 19 13:59:08 aat-srv002 sshd[22264]: Failed password for invalid user ubuntu from 62.127.106.82 port 34034 ssh2
...
2019-08-20 03:11:08
174.138.28.228 attack
Aug 19 18:51:27 web8 sshd\[21197\]: Invalid user account from 174.138.28.228
Aug 19 18:51:27 web8 sshd\[21197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.28.228
Aug 19 18:51:29 web8 sshd\[21197\]: Failed password for invalid user account from 174.138.28.228 port 32908 ssh2
Aug 19 18:59:18 web8 sshd\[24724\]: Invalid user justine from 174.138.28.228
Aug 19 18:59:18 web8 sshd\[24724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.28.228
2019-08-20 03:05:51
107.172.3.124 attackspambots
2019-08-19T18:59:19.426196abusebot-2.cloudsearch.cf sshd\[29520\]: Invalid user butter from 107.172.3.124 port 36399
2019-08-20 03:03:44
80.82.70.239 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-08-20 03:23:35
90.146.1.60 attack
Aug 19 18:53:25 game-panel sshd[4005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.146.1.60
Aug 19 18:53:27 game-panel sshd[4005]: Failed password for invalid user radiusd from 90.146.1.60 port 49888 ssh2
Aug 19 18:59:08 game-panel sshd[4208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.146.1.60
2019-08-20 03:10:37
204.17.56.42 attackspam
Automated report - ssh fail2ban:
Aug 19 20:58:38 wrong password, user=root, port=36964, ssh2
Aug 19 20:58:42 wrong password, user=root, port=36964, ssh2
Aug 19 20:58:46 wrong password, user=root, port=36964, ssh2
2019-08-20 03:26:36
106.58.210.27 attackbotsspam
Aug 19 20:57:52 relay postfix/smtpd\[9491\]: warning: unknown\[106.58.210.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 19 20:57:59 relay postfix/smtpd\[32129\]: warning: unknown\[106.58.210.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 19 20:58:11 relay postfix/smtpd\[16063\]: warning: unknown\[106.58.210.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 19 20:58:36 relay postfix/smtpd\[16063\]: warning: unknown\[106.58.210.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 19 20:58:43 relay postfix/smtpd\[32129\]: warning: unknown\[106.58.210.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-20 03:33:46
121.239.53.98 attack
$f2bV_matches
2019-08-20 03:12:04

Recently Reported IPs

96.66.201.94 84.91.145.233 32.12.194.100 197.20.98.240
88.109.130.208 130.111.144.216 160.84.190.183 222.43.148.187
29.190.136.116 233.64.102.24 30.167.5.13 127.160.130.115
19.9.128.3 200.122.226.244 169.76.231.204 135.199.226.10
137.231.96.156 79.216.70.117 15.115.244.49 64.199.0.143