Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.164.148.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2913
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.164.148.229.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:24:57 CST 2025
;; MSG SIZE  rcvd: 108
Host info
229.148.164.145.in-addr.arpa domain name pointer 145.164.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
229.148.164.145.in-addr.arpa	name = 145.164.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.224.251.217 attack
19/12/3@17:30:34: FAIL: IoT-Telnet address from=45.224.251.217
...
2019-12-04 08:23:47
193.70.2.117 attackspam
Dec  4 00:47:38 sauna sshd[11096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.2.117
Dec  4 00:47:40 sauna sshd[11096]: Failed password for invalid user sweetpea from 193.70.2.117 port 55930 ssh2
...
2019-12-04 08:36:02
180.250.140.74 attackbotsspam
"Fail2Ban detected SSH brute force attempt"
2019-12-04 08:02:55
112.6.231.114 attackbots
Dec  3 23:48:28 ns382633 sshd\[5281\]: Invalid user monta from 112.6.231.114 port 37044
Dec  3 23:48:28 ns382633 sshd\[5281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.6.231.114
Dec  3 23:48:29 ns382633 sshd\[5281\]: Failed password for invalid user monta from 112.6.231.114 port 37044 ssh2
Dec  3 23:59:35 ns382633 sshd\[7119\]: Invalid user admin from 112.6.231.114 port 19000
Dec  3 23:59:35 ns382633 sshd\[7119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.6.231.114
2019-12-04 08:20:31
218.92.0.134 attackbots
2019-12-04T01:10:34.046828vps751288.ovh.net sshd\[19620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.134  user=root
2019-12-04T01:10:36.035317vps751288.ovh.net sshd\[19620\]: Failed password for root from 218.92.0.134 port 24028 ssh2
2019-12-04T01:10:40.021506vps751288.ovh.net sshd\[19620\]: Failed password for root from 218.92.0.134 port 24028 ssh2
2019-12-04T01:10:43.220429vps751288.ovh.net sshd\[19620\]: Failed password for root from 218.92.0.134 port 24028 ssh2
2019-12-04T01:10:46.832330vps751288.ovh.net sshd\[19620\]: Failed password for root from 218.92.0.134 port 24028 ssh2
2019-12-04 08:16:14
101.95.157.222 attackspam
Dec  4 01:08:39 vps666546 sshd\[4048\]: Invalid user kami from 101.95.157.222 port 34010
Dec  4 01:08:39 vps666546 sshd\[4048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.95.157.222
Dec  4 01:08:41 vps666546 sshd\[4048\]: Failed password for invalid user kami from 101.95.157.222 port 34010 ssh2
Dec  4 01:15:09 vps666546 sshd\[4368\]: Invalid user cairns from 101.95.157.222 port 40978
Dec  4 01:15:09 vps666546 sshd\[4368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.95.157.222
...
2019-12-04 08:29:56
79.138.8.183 attackspambots
firewall-block, port(s): 23/tcp
2019-12-04 07:58:30
182.61.11.3 attackbots
2019-12-04T00:28:02.060487abusebot-3.cloudsearch.cf sshd\[11080\]: Invalid user raschbacher from 182.61.11.3 port 52098
2019-12-04 08:31:42
186.93.50.135 attack
Unauthorized connection attempt from IP address 186.93.50.135 on Port 445(SMB)
2019-12-04 08:21:25
185.175.93.27 attack
12/04/2019-00:44:03.180207 185.175.93.27 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-04 08:13:34
200.93.151.4 attackbots
Unauthorized connection attempt from IP address 200.93.151.4 on Port 445(SMB)
2019-12-04 08:30:12
45.55.142.207 attackspam
F2B jail: sshd. Time: 2019-12-04 00:57:28, Reported by: VKReport
2019-12-04 08:07:45
106.13.217.93 attackbots
Dec  4 00:36:08 vmanager6029 sshd\[19271\]: Invalid user xihuidc!@\#\$%\^ from 106.13.217.93 port 39122
Dec  4 00:36:08 vmanager6029 sshd\[19271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.217.93
Dec  4 00:36:10 vmanager6029 sshd\[19271\]: Failed password for invalid user xihuidc!@\#\$%\^ from 106.13.217.93 port 39122 ssh2
2019-12-04 08:12:37
159.203.193.246 attackbots
firewall-block, port(s): 4433/tcp
2019-12-04 08:27:31
49.235.173.198 attackspam
attempting numerous port scans for example: 
/?author=20
/?author=19
/?author=18
etc.
2019-12-04 08:22:24

Recently Reported IPs

19.149.70.101 71.89.232.118 83.129.188.213 12.41.142.137
197.220.97.219 117.16.99.213 235.99.248.1 107.25.54.41
233.133.65.93 135.248.14.20 237.192.113.69 77.223.211.166
134.186.60.89 40.58.129.20 222.66.186.137 6.60.86.71
208.234.102.169 98.204.188.207 129.222.97.230 208.148.121.193