Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.199.54.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60273
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.199.54.224.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 22:23:58 CST 2025
;; MSG SIZE  rcvd: 107
Host info
224.54.199.145.in-addr.arpa domain name pointer 145.199.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
224.54.199.145.in-addr.arpa	name = 145.199.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
184.54.51.74 attack
Time:     Thu Sep  3 11:34:43 2020 +0000
IP:       184.54.51.74 (US/United States/cpe-184-54-51-74.swo.res.rr.com)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep  3 11:34:32 ca-1-ams1 sshd[47277]: Invalid user admin from 184.54.51.74 port 44921
Sep  3 11:34:34 ca-1-ams1 sshd[47277]: Failed password for invalid user admin from 184.54.51.74 port 44921 ssh2
Sep  3 11:34:36 ca-1-ams1 sshd[47279]: Invalid user admin from 184.54.51.74 port 45012
Sep  3 11:34:38 ca-1-ams1 sshd[47279]: Failed password for invalid user admin from 184.54.51.74 port 45012 ssh2
Sep  3 11:34:39 ca-1-ams1 sshd[47282]: Invalid user admin from 184.54.51.74 port 45110
2020-09-03 21:33:47
198.38.86.161 attack
Sep  2 19:01:59 localhost sshd[72665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.38.86.161  user=root
Sep  2 19:02:02 localhost sshd[72665]: Failed password for root from 198.38.86.161 port 51088 ssh2
Sep  2 19:10:14 localhost sshd[73551]: Invalid user erika from 198.38.86.161 port 45646
Sep  2 19:10:14 localhost sshd[73551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.38.86.161
Sep  2 19:10:14 localhost sshd[73551]: Invalid user erika from 198.38.86.161 port 45646
Sep  2 19:10:16 localhost sshd[73551]: Failed password for invalid user erika from 198.38.86.161 port 45646 ssh2
...
2020-09-03 22:07:49
76.184.229.147 attackbotsspam
$f2bV_matches
2020-09-03 21:28:26
107.172.211.13 attack
2020-09-02 11:42:30.667343-0500  localhost smtpd[8057]: NOQUEUE: reject: RCPT from unknown[107.172.211.13]: 450 4.7.25 Client host rejected: cannot find your hostname, [107.172.211.13]; from= to= proto=ESMTP helo=<00ea8fcb.purebloods.icu>
2020-09-03 21:48:25
222.186.175.148 attackspam
Sep  3 15:26:21 pve1 sshd[2899]: Failed password for root from 222.186.175.148 port 57966 ssh2
Sep  3 15:26:24 pve1 sshd[2899]: Failed password for root from 222.186.175.148 port 57966 ssh2
...
2020-09-03 21:38:27
125.139.89.75 attackbotsspam
SSH_scan
2020-09-03 22:09:21
128.199.22.36 attackbots
Fail2Ban Ban Triggered
2020-09-03 22:02:40
162.142.125.35 attackbots
Icarus honeypot on github
2020-09-03 21:36:31
123.30.181.234 attackbotsspam
1599065272 - 09/02/2020 18:47:52 Host: 123.30.181.234/123.30.181.234 Port: 445 TCP Blocked
2020-09-03 22:01:48
117.50.63.241 attackspam
reported through recidive - multiple failed attempts(SSH)
2020-09-03 21:56:32
109.228.166.242 attack
Sep  2 17:05:48 IngegnereFirenze sshd[27471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.228.166.242  user=root
...
2020-09-03 22:00:08
45.95.168.131 attack
Sep  3 15:39:26 web2 sshd[32020]: Failed password for root from 45.95.168.131 port 55320 ssh2
2020-09-03 21:46:59
31.170.123.253 attackbotsspam
URL Probing: /wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php
2020-09-03 21:27:31
23.83.89.94 attackbotsspam
form spam
2020-09-03 21:44:03
178.174.147.7 attackspam
$f2bV_matches
2020-09-03 22:01:33

Recently Reported IPs

23.61.167.46 40.67.153.235 35.82.135.237 192.239.7.217
56.98.106.29 77.201.186.165 164.138.75.54 85.255.151.113
21.201.27.193 235.40.196.20 158.1.44.70 167.219.210.26
27.10.88.179 171.137.66.236 40.140.231.236 210.75.147.230
109.201.255.56 240.74.7.109 162.114.84.88 150.110.157.163