Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.209.54.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 281
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.209.54.4.			IN	A

;; AUTHORITY SECTION:
.			330	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023012600 1800 900 604800 86400

;; Query time: 141 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 26 18:51:55 CST 2023
;; MSG SIZE  rcvd: 105
Host info
4.54.209.145.in-addr.arpa domain name pointer 145.209.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.54.209.145.in-addr.arpa	name = 145.209.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
115.133.237.161 attack
Aug 15 20:29:10 ns3033917 sshd[15019]: Failed password for root from 115.133.237.161 port 44116 ssh2
Aug 15 20:44:26 ns3033917 sshd[15147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.133.237.161  user=root
Aug 15 20:44:28 ns3033917 sshd[15147]: Failed password for root from 115.133.237.161 port 54258 ssh2
...
2020-08-16 07:16:13
159.65.150.151 attackspambots
Aug 16 01:14:05 ns382633 sshd\[7346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.150.151  user=root
Aug 16 01:14:07 ns382633 sshd\[7346\]: Failed password for root from 159.65.150.151 port 33890 ssh2
Aug 16 01:17:47 ns382633 sshd\[8216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.150.151  user=root
Aug 16 01:17:49 ns382633 sshd\[8216\]: Failed password for root from 159.65.150.151 port 41956 ssh2
Aug 16 01:20:21 ns382633 sshd\[8893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.150.151  user=root
2020-08-16 07:33:26
129.126.244.51 attack
Bruteforce detected by fail2ban
2020-08-16 07:12:57
46.29.155.20 attackspam
" "
2020-08-16 07:35:39
218.92.0.158 attackspam
Aug 15 23:08:57 scw-6657dc sshd[19438]: Failed password for root from 218.92.0.158 port 62786 ssh2
Aug 15 23:08:57 scw-6657dc sshd[19438]: Failed password for root from 218.92.0.158 port 62786 ssh2
Aug 15 23:09:00 scw-6657dc sshd[19438]: Failed password for root from 218.92.0.158 port 62786 ssh2
...
2020-08-16 07:11:42
191.249.180.35 attackbotsspam
Automatic report - Port Scan Attack
2020-08-16 07:20:39
222.186.175.150 attackspam
Fail2Ban Ban Triggered (2)
2020-08-16 07:07:03
162.243.128.208 attackbotsspam
Port Scan
...
2020-08-16 07:13:40
175.44.42.186 attack
Making suspicious HEAD requests
2020-08-16 07:40:45
176.22.253.182 attackspam
RDP brute forcing (r)
2020-08-16 07:17:08
143.255.242.150 attack
Automatic report - Port Scan Attack
2020-08-16 07:23:55
188.166.247.82 attackspambots
Failed password for root from 188.166.247.82 port 36222 ssh2
2020-08-16 07:32:40
212.64.27.53 attackbots
Brute-force attempt banned
2020-08-16 07:31:59
51.158.69.131 attack
Mailserver and mailaccount attacks
2020-08-16 07:19:20
106.13.66.103 attackbotsspam
Aug 15 20:15:46 firewall sshd[23813]: Failed password for root from 106.13.66.103 port 34498 ssh2
Aug 15 20:19:58 firewall sshd[24035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.66.103  user=root
Aug 15 20:19:59 firewall sshd[24035]: Failed password for root from 106.13.66.103 port 42484 ssh2
...
2020-08-16 07:37:20

Recently Reported IPs

153.219.228.207 139.202.33.133 139.31.47.35 138.58.94.181
137.116.32.94 134.184.77.78 132.164.251.185 131.201.129.30
70.155.194.108 129.145.96.203 122.192.247.25 118.33.138.121
178.239.87.243 161.103.184.194 1.146.244.188 102.106.239.125
102.36.58.198 67.244.189.3 143.82.132.5 0.130.204.205