Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.168.75.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3402
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.168.75.5.			IN	A

;; AUTHORITY SECTION:
.			456	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 10:50:25 CST 2022
;; MSG SIZE  rcvd: 105
Host info
5.75.168.145.in-addr.arpa domain name pointer 145.168.early-registration.of.surfnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.75.168.145.in-addr.arpa	name = 145.168.early-registration.of.surfnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.235.227.230 attackspambots
DATE:2019-07-19_18:41:32, IP:89.235.227.230, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-20 05:09:41
188.166.254.118 attack
WordPress login Brute force / Web App Attack on client site.
2019-07-20 05:24:11
178.128.3.152 attackspambots
Invalid user vscan from 178.128.3.152 port 47928
2019-07-20 05:45:15
5.34.180.207 attackspambots
Misuse of DNS server
2019-07-20 05:30:19
186.225.98.234 attack
[ER hit] Tried to deliver spam. Already well known.
2019-07-20 05:25:11
149.210.178.197 attackspambots
Unauthorised access (Jul 19) SRC=149.210.178.197 LEN=52 TOS=0x02 TTL=119 ID=9832 DF TCP DPT=3389 WINDOW=8192 CWR ECE SYN
2019-07-20 05:28:10
188.29.84.242 attackbots
any capitals replacements on websites selling/avoid/likely be tampered with /village people are in empty properties/village-hotel.co.uk set up by stalking GSTATIC.COM users/parkingcrew.net/sedoparking.com users -links to neighbour who's anti eng as expected/further north still have cave batons /rest of uk are being hacked/been hacking since WWW invention
2019-07-20 05:10:44
201.92.122.202 attackbots
8080/tcp
[2019-07-19]1pkt
2019-07-20 05:41:51
149.202.189.32 attackspam
Jul 17 12:27:09 www6-3 sshd[23829]: Invalid user s from 149.202.189.32 port 35124
Jul 17 12:27:09 www6-3 sshd[23829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.189.32
Jul 17 12:27:11 www6-3 sshd[23829]: Failed password for invalid user s from 149.202.189.32 port 35124 ssh2
Jul 17 12:27:11 www6-3 sshd[23829]: Received disconnect from 149.202.189.32 port 35124:11: Bye Bye [preauth]
Jul 17 12:27:11 www6-3 sshd[23829]: Disconnected from 149.202.189.32 port 35124 [preauth]
Jul 17 12:39:01 www6-3 sshd[24264]: Invalid user tony from 149.202.189.32 port 33916
Jul 17 12:39:01 www6-3 sshd[24264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.189.32
Jul 17 12:39:04 www6-3 sshd[24264]: Failed password for invalid user tony from 149.202.189.32 port 33916 ssh2
Jul 17 12:39:04 www6-3 sshd[24264]: Received disconnect from 149.202.189.32 port 33916:11: Bye Bye [preauth]
Jul 17 12:39:0........
-------------------------------
2019-07-20 05:36:33
88.231.148.232 attackspambots
Automatic report - Port Scan Attack
2019-07-20 05:20:33
128.61.111.183 attackspam
Jul 18 23:23:00 vtv3 sshd\[5419\]: Invalid user invoices from 128.61.111.183 port 38702
Jul 18 23:23:00 vtv3 sshd\[5419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.61.111.183
Jul 18 23:23:02 vtv3 sshd\[5419\]: Failed password for invalid user invoices from 128.61.111.183 port 38702 ssh2
Jul 18 23:28:19 vtv3 sshd\[7887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.61.111.183  user=root
Jul 18 23:28:21 vtv3 sshd\[7887\]: Failed password for root from 128.61.111.183 port 36286 ssh2
Jul 18 23:39:18 vtv3 sshd\[12999\]: Invalid user web3 from 128.61.111.183 port 59770
Jul 18 23:39:18 vtv3 sshd\[12999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.61.111.183
Jul 18 23:39:20 vtv3 sshd\[12999\]: Failed password for invalid user web3 from 128.61.111.183 port 59770 ssh2
Jul 18 23:44:44 vtv3 sshd\[15516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=
2019-07-20 05:10:15
170.130.187.38 attackspambots
19.07.2019 19:27:22 Connection to port 161 blocked by firewall
2019-07-20 05:30:36
185.46.48.13 attackspambots
[portscan] Port scan
2019-07-20 05:44:07
113.22.74.104 attackspam
Unauthorised access (Jul 19) SRC=113.22.74.104 LEN=52 TTL=109 ID=24362 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-20 05:34:03
71.63.122.65 attackbots
Too many connections or unauthorized access detected from Oscar banned ip
2019-07-20 05:46:22

Recently Reported IPs

59.168.223.164 28.214.138.6 198.180.11.77 70.183.116.179
198.39.2.69 249.192.119.23 95.76.191.49 76.72.147.15
26.44.102.69 207.74.120.124 206.148.213.12 92.112.199.167
171.33.8.175 230.45.75.151 33.235.235.148 229.144.200.226
66.237.117.7 175.223.108.21 200.42.213.197 5.93.142.108