Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.165.99.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.165.99.63.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 13:47:05 CST 2025
;; MSG SIZE  rcvd: 106
Host info
63.99.165.145.in-addr.arpa domain name pointer 145.165.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
63.99.165.145.in-addr.arpa	name = 145.165.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.199.68.181 attackspam
Autoban   103.199.68.181 AUTH/CONNECT
2019-11-18 19:49:27
103.127.95.102 attack
Autoban   103.127.95.102 AUTH/CONNECT
2019-11-18 20:22:20
103.20.191.242 attack
Autoban   103.20.191.242 AUTH/CONNECT
2019-11-18 19:46:10
187.115.123.74 attack
Autoban   187.115.123.74 ABORTED AUTH
2019-11-18 20:20:09
186.215.199.69 attackbots
Autoban   186.215.199.69 ABORTED AUTH
2019-11-18 20:22:02
103.194.90.34 attack
Autoban   103.194.90.34 AUTH/CONNECT
2019-11-18 19:56:01
189.76.186.206 attack
Autoban   189.76.186.206 ABORTED AUTH
2019-11-18 20:09:19
189.114.67.213 attack
Autoban   189.114.67.213 ABORTED AUTH
2019-11-18 20:12:00
5.174.126.172 attack
Unauthorised access (Nov 18) SRC=5.174.126.172 LEN=52 TTL=119 ID=27118 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-18 20:05:10
222.186.180.41 attackbots
Nov 18 13:09:34 localhost sshd\[8630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Nov 18 13:09:37 localhost sshd\[8630\]: Failed password for root from 222.186.180.41 port 55454 ssh2
Nov 18 13:09:40 localhost sshd\[8630\]: Failed password for root from 222.186.180.41 port 55454 ssh2
2019-11-18 20:11:41
103.134.2.147 attackspam
Autoban   103.134.2.147 AUTH/CONNECT
2019-11-18 20:18:34
103.199.159.246 attack
Autoban   103.199.159.246 AUTH/CONNECT
2019-11-18 19:51:17
103.192.156.171 attackbotsspam
Autoban   103.192.156.171 AUTH/CONNECT
2019-11-18 20:04:38
211.150.70.18 attack
firewall-block, port(s): 16010/tcp
2019-11-18 20:05:24
211.232.116.145 attackspam
Autoban   211.232.116.145 ABORTED AUTH
2019-11-18 19:44:20

Recently Reported IPs

124.120.240.180 155.185.113.75 3.209.59.128 80.157.202.193
86.59.70.155 62.221.38.246 209.174.58.176 199.209.28.226
133.113.121.56 40.254.109.134 145.203.59.117 9.27.15.140
234.229.155.166 19.48.83.47 30.182.189.4 232.192.239.216
150.16.61.50 49.240.180.131 218.89.245.112 125.72.64.137