Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: SURFnet bv

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.200.2.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10969
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.200.2.45.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jun 14 01:23:55 CST 2019
;; MSG SIZE  rcvd: 116

Host info
45.2.200.145.in-addr.arpa domain name pointer 145.200.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
45.2.200.145.in-addr.arpa	name = 145.200.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
129.226.174.139 attackbotsspam
SSH Login Bruteforce
2020-05-16 00:01:02
164.132.46.14 attackspam
May 15 14:21:09 vps sshd[29601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.14 
May 15 14:21:11 vps sshd[29601]: Failed password for invalid user linuxacademy from 164.132.46.14 port 46968 ssh2
May 15 14:24:41 vps sshd[29758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.14 
...
2020-05-16 00:11:55
62.151.177.85 attackbots
Invalid user admin from 62.151.177.85 port 57814
2020-05-16 00:25:03
140.143.0.121 attackspam
$f2bV_matches
2020-05-16 00:12:54
213.238.181.133 attackspambots
/xmlrpc.php
2020-05-16 00:13:56
67.205.135.127 attack
k+ssh-bruteforce
2020-05-16 00:27:45
68.183.227.252 attack
May 15 14:39:41 localhost sshd\[30133\]: Invalid user deploy from 68.183.227.252
May 15 14:39:41 localhost sshd\[30133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.227.252
May 15 14:39:43 localhost sshd\[30133\]: Failed password for invalid user deploy from 68.183.227.252 port 60542 ssh2
May 15 14:45:05 localhost sshd\[30657\]: Invalid user rodrigo from 68.183.227.252
May 15 14:45:05 localhost sshd\[30657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.227.252
...
2020-05-15 23:55:27
49.88.112.60 attackspambots
May 15 17:48:27 vps sshd[145143]: Failed password for root from 49.88.112.60 port 60143 ssh2
May 15 17:48:31 vps sshd[145143]: Failed password for root from 49.88.112.60 port 60143 ssh2
May 15 17:55:04 vps sshd[175122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.60  user=root
May 15 17:55:06 vps sshd[175122]: Failed password for root from 49.88.112.60 port 13069 ssh2
May 15 17:55:08 vps sshd[175122]: Failed password for root from 49.88.112.60 port 13069 ssh2
...
2020-05-16 00:03:18
195.54.160.183 attackbots
honeypot 22 port
2020-05-16 00:35:29
200.196.253.251 attackbotsspam
May 15 18:27:42 vpn01 sshd[21145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.196.253.251
May 15 18:27:44 vpn01 sshd[21145]: Failed password for invalid user mcedit from 200.196.253.251 port 49312 ssh2
...
2020-05-16 00:33:57
1.55.239.198 attack
2020-05-15T12:24:34.635008homeassistant sshd[10796]: Invalid user Administrator from 1.55.239.198 port 55282
2020-05-15T12:24:34.880996homeassistant sshd[10796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.55.239.198
...
2020-05-16 00:17:16
146.164.51.58 attack
Lines containing failures of 146.164.51.58
May 14 13:02:17 ris sshd[16608]: Invalid user tomcat from 146.164.51.58 port 41994
May 14 13:02:17 ris sshd[16608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.164.51.58 
May 14 13:02:19 ris sshd[16608]: Failed password for invalid user tomcat from 146.164.51.58 port 41994 ssh2
May 14 13:02:20 ris sshd[16608]: Received disconnect from 146.164.51.58 port 41994:11: Bye Bye [preauth]
May 14 13:02:20 ris sshd[16608]: Disconnected from invalid user tomcat 146.164.51.58 port 41994 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=146.164.51.58
2020-05-16 00:05:41
123.16.138.48 attackbotsspam
May 14 11:34:37 scivo sshd[18830]: Address 123.16.138.48 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
May 14 11:34:37 scivo sshd[18830]: Invalid user adriana from 123.16.138.48
May 14 11:34:37 scivo sshd[18830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.16.138.48 
May 14 11:34:39 scivo sshd[18830]: Failed password for invalid user adriana from 123.16.138.48 port 49030 ssh2
May 14 11:34:39 scivo sshd[18830]: Received disconnect from 123.16.138.48: 11: Bye Bye [preauth]
May 14 11:47:59 scivo sshd[19655]: Address 123.16.138.48 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
May 14 11:47:59 scivo sshd[19655]: Invalid user test from 123.16.138.48
May 14 11:47:59 scivo sshd[19655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.16.138.48 
May 14 11:48:01 scivo sshd[19655]: Failed passwor........
-------------------------------
2020-05-16 00:31:57
46.101.43.224 attackbotsspam
May 15 15:06:30 *** sshd[23799]: User root from 46.101.43.224 not allowed because not listed in AllowUsers
2020-05-16 00:35:11
80.85.156.55 attack
80.85.156.55 - - [15/May/2020:14:24:14 +0200] "GET /wp-login.php HTTP/1.1" 200 6451 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
80.85.156.55 - - [15/May/2020:14:24:17 +0200] "POST /wp-login.php HTTP/1.1" 200 6702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
80.85.156.55 - - [15/May/2020:14:24:19 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-16 00:28:41

Recently Reported IPs

216.248.135.54 178.128.126.39 64.140.127.188 51.234.16.231
39.42.176.208 115.61.104.76 70.79.215.190 37.255.91.31
87.249.94.173 197.182.164.253 200.77.186.219 52.171.18.74
158.1.5.9 117.108.185.15 107.161.186.40 140.1.23.66
176.219.213.185 58.143.10.159 105.154.52.225 177.154.234.171