Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.168.234.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9911
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.168.234.83.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 21:47:05 CST 2025
;; MSG SIZE  rcvd: 107
Host info
83.234.168.145.in-addr.arpa domain name pointer 145.168.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
83.234.168.145.in-addr.arpa	name = 145.168.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.196.110.170 attackspambots
$f2bV_matches
2020-01-15 22:02:23
112.85.42.178 attackspam
Jan 15 14:44:54 MK-Soft-VM5 sshd[16647]: Failed password for root from 112.85.42.178 port 38435 ssh2
Jan 15 14:44:59 MK-Soft-VM5 sshd[16647]: Failed password for root from 112.85.42.178 port 38435 ssh2
...
2020-01-15 22:03:44
181.177.250.221 attackspam
Unauthorized connection attempt detected from IP address 181.177.250.221 to port 1433
2020-01-15 22:38:59
183.236.248.227 attack
Unauthorized connection attempt detected from IP address 183.236.248.227 to port 23 [T]
2020-01-15 22:35:20
42.113.229.42 attackspambots
Unauthorized connection attempt detected from IP address 42.113.229.42 to port 23 [J]
2020-01-15 22:26:29
118.237.229.131 attack
Unauthorized connection attempt detected from IP address 118.237.229.131 to port 83 [J]
2020-01-15 22:20:04
139.129.97.48 attack
Unauthorized connection attempt detected from IP address 139.129.97.48 to port 8545 [J]
2020-01-15 22:44:32
118.70.32.27 attackbotsspam
Brute-force attempt banned
2020-01-15 22:05:07
218.26.206.158 attack
Unauthorized connection attempt detected from IP address 218.26.206.158 to port 1433 [T]
2020-01-15 22:31:13
103.12.161.242 attackbotsspam
Unauthorized connection attempt detected from IP address 103.12.161.242 to port 23 [T]
2020-01-15 22:21:54
222.84.169.48 attackbots
Unauthorized connection attempt detected from IP address 222.84.169.48 to port 23 [J]
2020-01-15 22:29:14
112.85.42.188 attack
01/15/2020-09:09:19.941341 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-01-15 22:10:51
46.160.33.132 attackbotsspam
Unauthorized connection attempt detected from IP address 46.160.33.132 to port 5555 [T]
2020-01-15 22:24:41
182.233.1.171 attackspambots
Unauthorized connection attempt detected from IP address 182.233.1.171 to port 5555 [T]
2020-01-15 22:17:26
202.91.250.96 attackspam
Unauthorized connection attempt detected from IP address 202.91.250.96 to port 445 [T]
2020-01-15 22:33:19

Recently Reported IPs

37.136.106.15 52.241.251.115 45.210.221.14 61.180.51.224
4.242.11.255 171.15.40.183 37.84.23.103 82.139.199.25
239.29.28.115 246.109.126.0 173.82.247.121 177.218.178.219
28.177.55.162 39.79.54.186 155.252.197.234 50.167.89.163
199.61.74.209 107.33.125.112 65.224.243.78 132.60.159.17