Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.20.139.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35312
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.20.139.108.			IN	A

;; AUTHORITY SECTION:
.			195	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022121501 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 16 06:59:55 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 108.139.20.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
server can't find 145.20.139.108.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
45.80.39.228 attack
$f2bV_matches
2019-06-25 02:54:08
78.186.184.231 attackbotsspam
Jun 24 18:55:01 heissa sshd\[30728\]: Invalid user admin from 78.186.184.231 port 29641
Jun 24 18:55:02 heissa sshd\[30728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.mayem.com.tr
Jun 24 18:55:05 heissa sshd\[30728\]: Failed password for invalid user admin from 78.186.184.231 port 29641 ssh2
Jun 24 18:55:18 heissa sshd\[30736\]: Invalid user admin from 78.186.184.231 port 31720
Jun 24 18:55:18 heissa sshd\[30736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.mayem.com.tr
2019-06-25 03:19:42
137.74.175.67 attackbots
Jun 24 18:31:45 srv-4 sshd\[20351\]: Invalid user vmail from 137.74.175.67
Jun 24 18:31:45 srv-4 sshd\[20351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.175.67
Jun 24 18:31:46 srv-4 sshd\[20351\]: Failed password for invalid user vmail from 137.74.175.67 port 55998 ssh2
...
2019-06-25 03:14:36
93.205.82.45 attack
fraudulent SSH attempt
2019-06-25 02:36:02
221.181.24.246 attack
Invalid user support from 221.181.24.246 port 34200
2019-06-25 03:07:22
165.22.41.73 attack
Invalid user admin from 165.22.41.73 port 44912
2019-06-25 02:42:08
206.189.181.86 attackspambots
Jun 24 14:13:48 TORMINT sshd\[3648\]: Invalid user student from 206.189.181.86
Jun 24 14:13:48 TORMINT sshd\[3648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.181.86
Jun 24 14:13:50 TORMINT sshd\[3648\]: Failed password for invalid user student from 206.189.181.86 port 59708 ssh2
...
2019-06-25 02:37:00
183.238.0.174 attack
Invalid user admin from 183.238.0.174 port 4885
2019-06-25 03:11:04
196.203.31.154 attackbotsspam
Jun 24 19:16:45 cvbmail sshd\[26839\]: Invalid user webserver from 196.203.31.154
Jun 24 19:16:45 cvbmail sshd\[26839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.203.31.154
Jun 24 19:16:47 cvbmail sshd\[26839\]: Failed password for invalid user webserver from 196.203.31.154 port 40607 ssh2
2019-06-25 03:08:59
165.227.151.59 attackspambots
2019-06-24T18:35:22.345473test01.cajus.name sshd\[31540\]: Invalid user admin from 165.227.151.59 port 54684
2019-06-24T18:35:22.372032test01.cajus.name sshd\[31540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=nilsriecker.de
2019-06-24T18:35:24.040945test01.cajus.name sshd\[31540\]: Failed password for invalid user admin from 165.227.151.59 port 54684 ssh2
2019-06-25 02:41:08
178.62.117.82 attack
SSH-Bruteforce
2019-06-25 02:40:33
82.83.41.162 attackbots
Invalid user osbash from 82.83.41.162 port 45634
2019-06-25 02:50:20
76.110.184.64 attackspam
Jun 24 19:19:32 ns3367391 sshd\[9283\]: Invalid user ramonovh from 76.110.184.64 port 48764
Jun 24 19:19:34 ns3367391 sshd\[9283\]: Failed password for invalid user ramonovh from 76.110.184.64 port 48764 ssh2
...
2019-06-25 03:20:00
73.246.30.134 attackspambots
Invalid user oracle from 73.246.30.134 port 42268
2019-06-25 02:52:03
125.9.48.100 attackspambots
2019-06-24T17:28:47.370959abusebot-4.cloudsearch.cf sshd\[6778\]: Invalid user bestyrer from 125.9.48.100 port 44842
2019-06-25 02:44:18

Recently Reported IPs

50.31.63.80 126.176.122.152 104.47.17.105 103.208.105.109
32.73.38.46 225.113.52.212 140.133.157.20 37.200.98.187
81.28.233.176 123.19.250.55 58.167.234.64 178.248.51.186
23.233.161.214 235.194.93.99 231.202.6.176 237.19.144.235
52.24.111.232 217.145.227.243 59.96.62.33 55.164.46.175