Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.189.118.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44735
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.189.118.217.		IN	A

;; AUTHORITY SECTION:
.			205	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 02:24:36 CST 2022
;; MSG SIZE  rcvd: 108
Host info
217.118.189.145.in-addr.arpa domain name pointer 145.189.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
217.118.189.145.in-addr.arpa	name = 145.189.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.248.168.176 attackspambots
Port scan: Attack repeated for 24 hours
2019-09-12 01:29:42
178.91.94.146 attack
Unauthorised access (Sep 11) SRC=178.91.94.146 LEN=40 TTL=242 ID=42519 TCP DPT=445 WINDOW=1024 SYN
2019-09-12 01:08:40
114.240.123.79 attackbots
Lines containing failures of 114.240.123.79
Sep 10 01:57:49 shared01 sshd[14933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.240.123.79  user=admin
Sep 10 01:57:51 shared01 sshd[14933]: Failed password for admin from 114.240.123.79 port 53988 ssh2
Sep 10 01:57:53 shared01 sshd[14933]: Failed password for admin from 114.240.123.79 port 53988 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.240.123.79
2019-09-12 02:28:01
185.175.93.105 attackbotsspam
firewall-block, port(s): 44512/tcp, 48512/tcp, 52912/tcp, 55212/tcp, 61512/tcp, 62712/tcp
2019-09-12 01:03:18
218.245.1.169 attackbots
Sep 11 11:13:52 localhost sshd\[110576\]: Invalid user hadoop from 218.245.1.169 port 55826
Sep 11 11:13:52 localhost sshd\[110576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.245.1.169
Sep 11 11:13:55 localhost sshd\[110576\]: Failed password for invalid user hadoop from 218.245.1.169 port 55826 ssh2
Sep 11 11:22:41 localhost sshd\[110865\]: Invalid user sinusbot from 218.245.1.169 port 53127
Sep 11 11:22:41 localhost sshd\[110865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.245.1.169
...
2019-09-12 02:37:42
125.64.94.212 attack
Sep  9 22:14:21 postfix postfix/smtpd\[8190\]: lost connection after EHLO from unknown\[125.64.94.212\]
Sep  9 22:14:22 postfix postfix/smtpd\[8190\]: lost connection after UNKNOWN from unknown\[125.64.94.212\]
...
2019-09-12 01:56:17
159.203.199.214 attackspambots
" "
2019-09-12 02:38:48
91.250.60.53 attack
Configuration snooping (/cgi-bin/ViewLog.asp): "POST 127.0.0.1:80/cgi-bin/ViewLog.asp"
2019-09-12 02:36:27
66.240.219.146 attackspambots
Sep 10 20:42:09 lenivpn01 kernel: \[373733.888182\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=66.240.219.146 DST=195.201.121.15 LEN=44 TOS=0x10 PREC=0x00 TTL=110 ID=9415 PROTO=TCP SPT=26200 DPT=800 WINDOW=53238 RES=0x00 SYN URGP=0 
Sep 10 23:16:52 lenivpn01 kernel: \[383016.459333\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=66.240.219.146 DST=195.201.121.15 LEN=44 TOS=0x10 PREC=0x00 TTL=110 ID=10354 PROTO=TCP SPT=26200 DPT=8058 WINDOW=58437 RES=0x00 SYN URGP=0 
Sep 11 00:55:36 lenivpn01 kernel: \[388940.441469\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=66.240.219.146 DST=195.201.121.15 LEN=44 TOS=0x10 PREC=0x00 TTL=110 ID=35335 PROTO=TCP SPT=26200 DPT=5190 WINDOW=52934 RES=0x00 SYN URGP=0 
...
2019-09-12 02:35:16
184.105.139.104 attack
4786/tcp 23/tcp 445/tcp...
[2019-07-17/09-11]33pkt,20pt.(tcp),2pt.(udp)
2019-09-12 01:52:56
185.176.27.18 attackbots
Excessive Port-Scanning
2019-09-12 01:02:27
94.20.55.169 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(09111103)
2019-09-12 02:01:18
80.82.77.139 attackbots
09/11/2019-14:28:35.500021 80.82.77.139 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 84
2019-09-12 02:31:00
74.82.47.27 attackbotsspam
" "
2019-09-12 02:06:46
120.52.152.17 attack
11.09.2019 18:29:00 Connection to port 3299 blocked by firewall
2019-09-12 02:27:29

Recently Reported IPs

219.230.116.248 200.119.152.198 116.159.187.163 97.188.122.93
46.36.54.89 145.227.127.238 36.179.19.44 133.129.57.226
103.143.147.2 8.196.164.145 183.74.99.161 231.64.90.244
63.126.182.129 116.120.231.214 131.223.41.206 226.221.39.198
197.137.220.214 166.162.207.202 186.60.64.79 67.66.253.11