Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.207.20.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55164
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.207.20.3.			IN	A

;; AUTHORITY SECTION:
.			407	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103000 1800 900 604800 86400

;; Query time: 115 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 30 16:53:52 CST 2019
;; MSG SIZE  rcvd: 116
Host info
3.20.207.145.in-addr.arpa domain name pointer 145.207.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
3.20.207.145.in-addr.arpa	name = 145.207.early-registration.of.surfnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
102.165.30.17 attackbots
 TCP (SYN) 102.165.30.17:56649 -> port 8080, len 44
2020-09-30 23:06:45
88.214.26.53 attackbots
 TCP (SYN) 88.214.26.53:49432 -> port 3456, len 44
2020-09-30 23:12:49
89.248.167.141 attackbots
firewall-block, port(s): 3414/tcp, 5020/tcp
2020-09-30 23:41:27
102.165.30.41 attackbotsspam
fail2ban detected bruce force on ssh iptables
2020-09-30 23:06:23
46.161.27.48 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 29 - port: 4040 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:45:19
5.61.58.53 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 5 - port: 55593 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:23:15
183.65.30.2 attackspambots
Icarus honeypot on github
2020-09-30 23:29:57
62.4.15.205 attack
SIPVicious Scanner Detection
2020-09-30 23:15:55
42.112.37.242 attack
 TCP (SYN) 42.112.37.242:49422 -> port 6016, len 44
2020-09-30 23:21:11
92.63.197.74 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 80 - port: 3402 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:38:24
51.161.12.231 attackbots
 TCP (SYN) 51.161.12.231:32767 -> port 8545, len 44
2020-09-30 23:44:42
45.143.221.132 attackspambots
ET SCAN Sipvicious Scan - port: 5060 proto: sip cat: Attempted Information Leakbytes: 458
2020-09-30 23:18:31
174.138.44.217 spam
Spamers/Phishing
2020-09-30 23:20:09
120.42.132.232 attackspambots
Brute forcing email accounts
2020-09-30 23:31:26
116.177.248.202 attackbotsspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 124
2020-09-30 23:31:39

Recently Reported IPs

64.216.41.149 38.234.8.125 217.29.242.162 171.73.104.85
30.246.19.236 234.129.49.0 110.207.236.230 125.161.130.19
9.10.41.82 96.247.0.213 103.167.245.173 62.210.8.242
83.137.36.32 246.53.189.179 159.176.35.178 144.75.134.200
238.154.39.211 17.38.24.224 228.33.60.105 218.76.252.143