Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.198.14.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5943
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.198.14.109.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 02:04:13 CST 2025
;; MSG SIZE  rcvd: 107
Host info
109.14.198.145.in-addr.arpa domain name pointer 145.198.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
109.14.198.145.in-addr.arpa	name = 145.198.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.206.255.181 attackbotsspam
Aug 27 23:35:33 marvibiene sshd[47134]: Invalid user spf from 123.206.255.181 port 45786
Aug 27 23:35:33 marvibiene sshd[47134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.255.181
Aug 27 23:35:33 marvibiene sshd[47134]: Invalid user spf from 123.206.255.181 port 45786
Aug 27 23:35:34 marvibiene sshd[47134]: Failed password for invalid user spf from 123.206.255.181 port 45786 ssh2
2020-08-28 09:48:02
51.83.104.120 attackbotsspam
Aug 28 05:56:47 mellenthin sshd[26455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.104.120  user=root
Aug 28 05:56:49 mellenthin sshd[26455]: Failed password for invalid user root from 51.83.104.120 port 48780 ssh2
2020-08-28 12:07:37
188.92.209.167 attack
Aug 28 02:07:36 mail.srvfarm.net postfix/smtpd[2002818]: warning: unknown[188.92.209.167]: SASL PLAIN authentication failed: 
Aug 28 02:07:36 mail.srvfarm.net postfix/smtpd[2002818]: lost connection after AUTH from unknown[188.92.209.167]
Aug 28 02:14:11 mail.srvfarm.net postfix/smtps/smtpd[2005514]: warning: unknown[188.92.209.167]: SASL PLAIN authentication failed: 
Aug 28 02:14:11 mail.srvfarm.net postfix/smtps/smtpd[2005514]: lost connection after AUTH from unknown[188.92.209.167]
Aug 28 02:16:39 mail.srvfarm.net postfix/smtpd[2019653]: warning: unknown[188.92.209.167]: SASL PLAIN authentication failed:
2020-08-28 09:40:17
220.132.75.140 attack
2020-08-28T01:42:54.767510shield sshd\[18992\]: Invalid user sistema from 220.132.75.140 port 53306
2020-08-28T01:42:54.800921shield sshd\[18992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-132-75-140.hinet-ip.hinet.net
2020-08-28T01:42:56.681881shield sshd\[18992\]: Failed password for invalid user sistema from 220.132.75.140 port 53306 ssh2
2020-08-28T01:46:45.701329shield sshd\[19588\]: Invalid user liza from 220.132.75.140 port 57876
2020-08-28T01:46:45.724563shield sshd\[19588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-132-75-140.hinet-ip.hinet.net
2020-08-28 09:56:58
218.92.0.133 attack
2020-08-28T01:24:43.036409dmca.cloudsearch.cf sshd[12588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
2020-08-28T01:24:44.800944dmca.cloudsearch.cf sshd[12588]: Failed password for root from 218.92.0.133 port 34206 ssh2
2020-08-28T01:24:47.536005dmca.cloudsearch.cf sshd[12588]: Failed password for root from 218.92.0.133 port 34206 ssh2
2020-08-28T01:24:43.036409dmca.cloudsearch.cf sshd[12588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
2020-08-28T01:24:44.800944dmca.cloudsearch.cf sshd[12588]: Failed password for root from 218.92.0.133 port 34206 ssh2
2020-08-28T01:24:47.536005dmca.cloudsearch.cf sshd[12588]: Failed password for root from 218.92.0.133 port 34206 ssh2
2020-08-28T01:24:43.036409dmca.cloudsearch.cf sshd[12588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
2020-08-28T01:2
...
2020-08-28 09:39:50
138.68.95.204 attackspam
Failed password for invalid user tata from 138.68.95.204 port 36680 ssh2
2020-08-28 09:58:57
167.172.201.94 attack
Invalid user update from 167.172.201.94 port 34942
2020-08-28 12:07:12
68.183.131.88 attackspam
Aug 28 03:25:45 ip106 sshd[18609]: Failed password for root from 68.183.131.88 port 41230 ssh2
...
2020-08-28 09:49:24
190.1.200.197 attack
(sshd) Failed SSH login from 190.1.200.197 (CO/Colombia/dsl-emcali-190.1.200.197.emcali.net.co): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 28 01:45:14 grace sshd[11599]: Invalid user bart from 190.1.200.197 port 59756
Aug 28 01:45:16 grace sshd[11599]: Failed password for invalid user bart from 190.1.200.197 port 59756 ssh2
Aug 28 01:50:27 grace sshd[12194]: Invalid user samplee from 190.1.200.197 port 51226
Aug 28 01:50:29 grace sshd[12194]: Failed password for invalid user samplee from 190.1.200.197 port 51226 ssh2
Aug 28 01:54:22 grace sshd[12291]: Invalid user starbound from 190.1.200.197 port 56628
2020-08-28 09:48:32
180.76.39.51 attackbots
bruteforce detected
2020-08-28 09:56:41
49.88.112.75 attackspambots
Aug 28 03:39:39 ip106 sshd[19397]: Failed password for root from 49.88.112.75 port 49689 ssh2
Aug 28 03:39:44 ip106 sshd[19397]: Failed password for root from 49.88.112.75 port 49689 ssh2
...
2020-08-28 10:04:21
91.121.173.41 attackbotsspam
2020-08-28T07:52:40.276665paragon sshd[553311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.173.41
2020-08-28T07:52:40.273938paragon sshd[553311]: Invalid user mysqld from 91.121.173.41 port 43844
2020-08-28T07:52:42.367057paragon sshd[553311]: Failed password for invalid user mysqld from 91.121.173.41 port 43844 ssh2
2020-08-28T07:56:10.983799paragon sshd[553644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.173.41  user=root
2020-08-28T07:56:12.235669paragon sshd[553644]: Failed password for root from 91.121.173.41 port 50088 ssh2
...
2020-08-28 12:09:48
222.66.154.98 attackspambots
Automatic report BANNED IP
2020-08-28 09:39:24
116.12.251.132 attackspam
Invalid user admin from 116.12.251.132 port 1514
2020-08-28 12:08:35
159.203.112.185 attackspam
Aug 27 20:23:10 Tower sshd[7723]: Connection from 159.203.112.185 port 58346 on 192.168.10.220 port 22 rdomain ""
Aug 27 20:23:11 Tower sshd[7723]: Invalid user manuel from 159.203.112.185 port 58346
Aug 27 20:23:11 Tower sshd[7723]: error: Could not get shadow information for NOUSER
Aug 27 20:23:11 Tower sshd[7723]: Failed password for invalid user manuel from 159.203.112.185 port 58346 ssh2
Aug 27 20:23:11 Tower sshd[7723]: Received disconnect from 159.203.112.185 port 58346:11: Bye Bye [preauth]
Aug 27 20:23:11 Tower sshd[7723]: Disconnected from invalid user manuel 159.203.112.185 port 58346 [preauth]
2020-08-28 09:51:26

Recently Reported IPs

208.164.120.184 155.172.103.250 29.158.143.7 5.231.26.243
138.87.238.232 61.136.77.31 21.65.45.28 114.57.75.247
245.78.38.24 192.81.30.254 204.220.54.17 124.110.6.142
249.244.154.53 70.166.154.104 24.149.164.77 242.215.116.238
196.176.60.69 109.38.143.164 126.201.107.140 97.255.48.79