Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.164.251.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53346
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.164.251.100.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011001 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 11 10:14:55 CST 2025
;; MSG SIZE  rcvd: 108
Host info
100.251.164.145.in-addr.arpa domain name pointer 145.164.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
100.251.164.145.in-addr.arpa	name = 145.164.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
130.204.74.70 attackspambots
9001/tcp
[2019-11-20]1pkt
2019-11-21 05:28:29
80.211.31.147 attack
Fail2Ban Ban Triggered
2019-11-21 05:23:17
163.172.251.80 attack
Nov 20 15:37:32 MK-Soft-VM5 sshd[19138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.251.80 
Nov 20 15:37:35 MK-Soft-VM5 sshd[19138]: Failed password for invalid user boulay from 163.172.251.80 port 38268 ssh2
...
2019-11-21 05:27:52
139.199.171.45 attackspam
SSH Brute-Force reported by Fail2Ban
2019-11-21 05:13:39
61.171.200.110 attackspam
445/tcp
[2019-11-20]1pkt
2019-11-21 05:32:50
61.216.15.225 attackspam
Fail2Ban - SSH Bruteforce Attempt
2019-11-21 05:31:13
83.254.140.226 attack
5555/tcp
[2019-11-20]1pkt
2019-11-21 05:22:15
128.199.221.30 attackbotsspam
11/20/2019-20:08:58.712445 128.199.221.30 Protocol: 6 ET SCAN NETWORK Incoming Masscan detected
2019-11-21 05:18:49
125.227.236.60 attack
SSH brutforce
2019-11-21 05:24:51
51.77.140.111 attackspam
Nov 20 16:11:55 icinga sshd[26960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.111
Nov 20 16:11:57 icinga sshd[26960]: Failed password for invalid user server from 51.77.140.111 port 49550 ssh2
...
2019-11-21 05:10:18
95.17.251.222 attackspam
8080/tcp
[2019-11-20]1pkt
2019-11-21 05:12:29
185.176.27.2 attackbotsspam
185.176.27.2 was recorded 64 times by 30 hosts attempting to connect to the following ports: 4511,7455,9079,2548,7162,7808,1112,3462,5848,1324,9162,6424,5403,390,740,7673,6474,2076,7478,406,1842,3265,5231,1809,2059,4715,1406,9532,1294,4051,9142,5535,7598,8757,5912,7067,1715,8937,3148,1323,9451,9178,1352,7937,5758,8362,7753,2109,9497,8385,4871,7394,2865,697,834,6178,1183,6379,5501,7498,633,1056,3633. Incident counter (4h, 24h, all-time): 64, 449, 1826
2019-11-21 05:11:36
211.72.164.185 attackspam
445/tcp
[2019-11-20]1pkt
2019-11-21 05:27:31
51.38.231.249 attackspambots
Nov 20 16:05:40 serwer sshd\[6461\]: Invalid user sharen from 51.38.231.249 port 34954
Nov 20 16:05:40 serwer sshd\[6461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.231.249
Nov 20 16:05:42 serwer sshd\[6461\]: Failed password for invalid user sharen from 51.38.231.249 port 34954 ssh2
...
2019-11-21 05:32:03
179.127.129.23 attack
23/tcp
[2019-11-20]1pkt
2019-11-21 05:18:25

Recently Reported IPs

28.156.19.168 56.162.122.248 151.196.245.91 210.154.244.130
251.210.33.158 9.198.222.29 114.161.52.251 214.15.243.99
146.37.48.205 242.243.155.110 207.71.108.124 193.170.117.39
160.239.79.179 83.76.72.83 37.134.77.125 191.37.94.78
195.205.167.211 74.93.206.36 152.163.179.136 39.75.94.127