Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.18.72.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65310
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.18.72.147.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 17:51:49 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 147.72.18.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.72.18.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
191.100.25.45 attack
Feb 15 04:25:57 www sshd\[58766\]: Invalid user adt from 191.100.25.45
Feb 15 04:25:57 www sshd\[58766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.100.25.45
Feb 15 04:25:58 www sshd\[58766\]: Failed password for invalid user adt from 191.100.25.45 port 58542 ssh2
...
2020-02-15 10:37:59
1.20.85.208 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 10:04:59
49.88.112.65 attack
Feb 15 01:48:01 hcbbdb sshd\[28386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Feb 15 01:48:03 hcbbdb sshd\[28386\]: Failed password for root from 49.88.112.65 port 54995 ssh2
Feb 15 01:49:09 hcbbdb sshd\[28503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Feb 15 01:49:10 hcbbdb sshd\[28503\]: Failed password for root from 49.88.112.65 port 42674 ssh2
Feb 15 01:50:16 hcbbdb sshd\[28636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
2020-02-15 10:04:26
107.180.91.86 attackspam
Feb 15 01:13:17 lock-38 sshd[25646]: Failed password for invalid user steamcmd from 107.180.91.86 port 41470 ssh2
Feb 15 01:13:35 lock-38 sshd[25649]: Failed password for invalid user steamcmd from 107.180.91.86 port 49722 ssh2
Feb 15 01:13:53 lock-38 sshd[25651]: Failed password for invalid user steamcmd from 107.180.91.86 port 57978 ssh2
...
2020-02-15 10:31:52
1.20.230.51 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 10:41:57
1.20.233.65 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 10:35:02
220.74.101.233 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-15 10:28:02
5.26.119.62 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-15 10:27:37
180.76.100.33 attack
Invalid user uwp from 180.76.100.33 port 34724
2020-02-15 10:47:39
222.127.23.74 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-15 10:13:48
178.128.191.43 attackspambots
Feb 14 16:06:46 auw2 sshd\[9230\]: Invalid user dork from 178.128.191.43
Feb 14 16:06:46 auw2 sshd\[9230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.191.43
Feb 14 16:06:48 auw2 sshd\[9230\]: Failed password for invalid user dork from 178.128.191.43 port 54128 ssh2
Feb 14 16:09:52 auw2 sshd\[9686\]: Invalid user wil from 178.128.191.43
Feb 14 16:09:52 auw2 sshd\[9686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.191.43
2020-02-15 10:29:23
109.233.187.211 attack
Email rejected due to spam filtering
2020-02-15 10:30:33
139.59.62.42 attack
$f2bV_matches
2020-02-15 10:48:16
94.191.25.132 attackbotsspam
SSH Brute-Force reported by Fail2Ban
2020-02-15 10:12:05
1.20.249.21 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 10:22:49

Recently Reported IPs

59.233.96.205 55.166.191.29 36.241.57.144 118.233.17.138
81.1.22.151 214.71.137.64 171.24.40.24 205.38.15.195
108.244.194.135 251.230.79.187 141.70.110.99 171.199.35.114
243.155.18.233 38.93.26.214 92.223.249.234 177.175.126.85
197.169.49.174 144.31.225.234 206.133.222.168 33.176.15.66