Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.18.40.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24316
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.18.40.72.			IN	A

;; AUTHORITY SECTION:
.			507	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122700 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 28 00:20:42 CST 2021
;; MSG SIZE  rcvd: 105
Host info
Host 72.40.18.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 72.40.18.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.184 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
Failed password for root from 218.92.0.184 port 44987 ssh2
Failed password for root from 218.92.0.184 port 44987 ssh2
Failed password for root from 218.92.0.184 port 44987 ssh2
Failed password for root from 218.92.0.184 port 44987 ssh2
2019-10-20 02:46:26
113.172.233.153 attackspam
Invalid user admin from 113.172.233.153 port 57522
2019-10-20 03:05:05
113.172.115.237 attackbots
Invalid user admin from 113.172.115.237 port 57543
2019-10-20 03:05:22
106.12.21.124 attackspambots
Invalid user bernier1 from 106.12.21.124 port 32788
2019-10-20 03:08:25
41.232.245.240 attack
Invalid user admin from 41.232.245.240 port 53674
2019-10-20 03:21:52
218.151.3.129 attack
Invalid user admin from 218.151.3.129 port 54320
2019-10-20 02:46:02
61.7.145.80 attackspambots
Invalid user admin from 61.7.145.80 port 59064
2019-10-20 03:16:51
159.65.54.221 attackspam
Oct 19 14:45:08 mail sshd\[3638\]: Invalid user test from 159.65.54.221
Oct 19 14:45:08 mail sshd\[3638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.54.221
...
2019-10-20 02:57:48
94.51.70.246 attackspambots
Invalid user admin from 94.51.70.246 port 43712
2019-10-20 03:11:18
51.75.205.122 attackbots
Invalid user admin from 51.75.205.122 port 39066
2019-10-20 03:19:08
52.178.149.89 attackspambots
SSH bruteforce
2019-10-20 03:18:35
58.16.113.184 attack
Invalid user admin from 58.16.113.184 port 59254
2019-10-20 03:18:12
61.91.57.34 attack
Invalid user admin from 61.91.57.34 port 48627
2019-10-20 03:16:40
119.61.26.165 attackbots
$f2bV_matches
2019-10-20 03:02:22
222.76.48.73 attackbots
dovecot jail - smtp auth [ma]
2019-10-20 02:44:47

Recently Reported IPs

19.242.170.164 27.157.157.196 146.120.124.22 152.116.102.116
200.10.111.61 109.208.55.191 52.71.44.97 228.163.84.185
90.112.213.72 26.198.162.102 215.181.242.90 99.70.51.106
184.161.202.172 173.162.107.231 202.185.63.241 186.21.174.223
159.87.134.249 185.229.144.22 186.192.160.1 154.32.29.64