Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.199.42.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18762
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.199.42.224.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 15:07:35 CST 2025
;; MSG SIZE  rcvd: 107
Host info
224.42.199.145.in-addr.arpa domain name pointer 145.199.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
224.42.199.145.in-addr.arpa	name = 145.199.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
173.201.196.110 attackspam
xmlrpc attack
2019-06-23 06:49:35
132.148.142.117 attack
belitungshipwreck.org 132.148.142.117 \[22/Jun/2019:17:02:48 +0200\] "POST /wp-login.php HTTP/1.1" 200 5597 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
belitungshipwreck.org 132.148.142.117 \[22/Jun/2019:17:02:49 +0200\] "POST /wp-login.php HTTP/1.1" 200 5575 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-06-23 07:20:42
91.163.112.140 attackbotsspam
Jun 22 18:30:09 vps647732 sshd[24508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.163.112.140
Jun 22 18:30:11 vps647732 sshd[24508]: Failed password for invalid user tao from 91.163.112.140 port 3617 ssh2
...
2019-06-23 06:55:40
178.4.170.29 attackspambots
Telnetd brute force attack detected by fail2ban
2019-06-23 07:18:11
202.142.81.150 attackbots
Attempt to run wp-login.php
2019-06-23 07:11:36
74.220.219.128 attack
xmlrpc attack
2019-06-23 06:43:00
212.64.7.134 attack
Invalid user dui from 212.64.7.134 port 58434
2019-06-23 07:17:08
92.118.160.61 attack
22.06.2019 17:30:23 Connection to port 139 blocked by firewall
2019-06-23 07:16:48
2a01:4f8:211:a1c::2 attackspambots
xmlrpc attack
2019-06-23 06:57:53
167.86.120.109 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-06-23 07:10:39
184.168.46.196 attackspam
xmlrpc attack
2019-06-23 06:44:11
103.254.12.51 attack
xmlrpc attack
2019-06-23 06:42:42
95.142.159.173 attackbotsspam
xmlrpc attack
2019-06-23 06:47:23
117.28.251.174 attackspambots
2019-06-22 16:29:42,627 [snip] proftpd[8355] [snip] (117.28.251.174[117.28.251.174]): USER root: no such user found from 117.28.251.174 [117.28.251.174] to ::ffff:[snip]:22
2019-06-22 16:29:48,286 [snip] proftpd[8363] [snip] (117.28.251.174[117.28.251.174]): USER root: no such user found from 117.28.251.174 [117.28.251.174] to ::ffff:[snip]:22
2019-06-22 16:29:52,353 [snip] proftpd[8371] [snip] (117.28.251.174[117.28.251.174]): USER root: no such user found from 117.28.251.174 [117.28.251.174] to ::ffff:[snip]:22[...]
2019-06-23 07:21:34
141.105.111.244 attackspam
8080/tcp
[2019-06-22]1pkt
2019-06-23 06:47:58

Recently Reported IPs

62.211.144.94 132.163.61.230 232.167.150.175 114.79.25.129
233.76.60.244 184.203.237.114 47.196.28.210 87.79.240.245
27.130.219.1 147.7.177.1 180.158.137.43 181.67.93.125
217.15.16.201 213.133.116.14 135.78.26.196 135.59.37.246
59.29.105.140 232.110.161.56 29.20.204.118 57.41.146.188