Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.204.30.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26887
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.204.30.154.			IN	A

;; AUTHORITY SECTION:
.			154	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040703 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 08 11:34:18 CST 2022
;; MSG SIZE  rcvd: 107
Host info
154.30.204.145.in-addr.arpa domain name pointer 145.204.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
154.30.204.145.in-addr.arpa	name = 145.204.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
52.247.66.65 attackbotsspam
Invalid user 252 from 52.247.66.65 port 57228
2020-09-27 22:50:03
124.131.142.255 attackbotsspam
23/tcp
[2020-09-26]1pkt
2020-09-27 23:10:23
60.209.24.197 attack
11211/udp
[2020-09-26]1pkt
2020-09-27 22:52:05
222.186.180.8 attack
Sep 27 16:56:06 server sshd[18935]: Failed none for root from 222.186.180.8 port 39714 ssh2
Sep 27 16:56:10 server sshd[18935]: Failed password for root from 222.186.180.8 port 39714 ssh2
Sep 27 16:56:13 server sshd[18935]: Failed password for root from 222.186.180.8 port 39714 ssh2
2020-09-27 22:58:20
193.41.131.40 attackbots
445/tcp
[2020-09-26]1pkt
2020-09-27 22:55:30
198.27.82.155 attackspam
SSH BruteForce Attack
2020-09-27 23:10:37
125.44.61.124 attackbotsspam
2323/tcp
[2020-09-26]1pkt
2020-09-27 23:00:30
182.116.97.36 attackspambots
23/tcp
[2020-09-26]1pkt
2020-09-27 23:08:15
61.135.152.133 attackbots
Port probing on unauthorized port 1433
2020-09-27 23:12:33
52.170.223.160 attack
2020-09-26 UTC: (4x) - 190,admin,root(2x)
2020-09-27 23:00:52
180.76.151.189 attackbotsspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-09-27 22:44:41
220.176.204.91 attack
Invalid user ubuntu from 220.176.204.91 port 14575
2020-09-27 22:46:00
13.78.230.118 attack
Invalid user 236 from 13.78.230.118 port 1344
2020-09-27 22:57:13
189.206.160.153 attackbotsspam
Invalid user redis1 from 189.206.160.153 port 13920
2020-09-27 23:07:54
175.24.42.136 attackspam
Sep 27 21:14:42 localhost sshd[129293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.42.136  user=root
Sep 27 21:14:44 localhost sshd[129293]: Failed password for root from 175.24.42.136 port 49398 ssh2
...
2020-09-27 22:54:43

Recently Reported IPs

239.208.232.54 95.126.187.130 58.187.221.33 211.216.200.15
94.136.85.82 227.213.32.220 26.18.218.39 164.179.16.143
1.211.85.169 229.246.49.102 105.15.127.236 66.96.225.112
169.140.29.219 117.40.79.160 144.34.217.92 14.191.145.65
126.217.141.154 115.84.73.213 253.211.54.113 115.84.73.235