Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.208.51.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5315
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.208.51.253.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060101 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 02 04:01:22 CST 2024
;; MSG SIZE  rcvd: 107
Host info
253.51.208.145.in-addr.arpa domain name pointer 145.208.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
253.51.208.145.in-addr.arpa	name = 145.208.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.204.215.126 attack
Brute force SMTP login attempted.
...
2019-08-10 09:42:19
186.227.179.177 attackspam
failed_logins
2019-08-10 09:35:16
185.254.122.200 attackspambots
08/09/2019-19:06:18.375641 185.254.122.200 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-10 09:56:46
185.119.81.50 attackbotsspam
Automatic report - Banned IP Access
2019-08-10 09:25:02
216.180.141.89 attackbots
20 attempts against mh_ha-misbehave-ban on fire.magehost.pro
2019-08-10 09:49:13
189.26.113.98 attackbots
Automatic report - Banned IP Access
2019-08-10 09:44:14
206.189.165.94 attackbots
Aug 10 01:46:29 OPSO sshd\[18092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.165.94  user=root
Aug 10 01:46:32 OPSO sshd\[18092\]: Failed password for root from 206.189.165.94 port 44592 ssh2
Aug 10 01:50:47 OPSO sshd\[18551\]: Invalid user xrdp from 206.189.165.94 port 37908
Aug 10 01:50:47 OPSO sshd\[18551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.165.94
Aug 10 01:50:50 OPSO sshd\[18551\]: Failed password for invalid user xrdp from 206.189.165.94 port 37908 ssh2
2019-08-10 09:51:52
200.23.234.57 attackspam
SASL PLAIN auth failed: ruser=...
2019-08-10 09:40:05
1.54.54.116 attackspam
Automatic report - Port Scan Attack
2019-08-10 09:34:15
129.204.116.250 attack
Brute force SMTP login attempted.
...
2019-08-10 09:49:44
199.33.124.242 attackspambots
Honeypot attack, port: 445, PTR: 199.33.124.242.rebelhosting.net.
2019-08-10 09:18:47
35.204.209.54 attackspam
Honeypot attack, port: 23, PTR: 54.209.204.35.bc.googleusercontent.com.
2019-08-10 09:38:51
2.187.234.151 attackbots
port scan and connect, tcp 23 (telnet)
2019-08-10 09:41:29
113.69.129.218 attackbotsspam
Trying to log into mailserver (postfix/smtp) using multiple names and passwords
2019-08-10 09:16:01
129.204.51.226 attack
Brute force SMTP login attempted.
...
2019-08-10 09:17:24

Recently Reported IPs

3.86.255.90 170.253.54.32 230.79.91.134 15.116.227.228
254.42.144.198 248.19.56.136 236.48.186.198 76.205.239.211
94.14.92.249 168.194.93.127 146.183.12.32 253.164.161.67
70.11.141.45 113.249.237.140 5.71.108.189 80.40.89.68
113.236.189.148 245.210.254.26 29.105.86.116 220.28.19.136