Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.212.203.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45792
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.212.203.53.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 23:35:13 CST 2025
;; MSG SIZE  rcvd: 107
Host info
53.203.212.145.in-addr.arpa domain name pointer 145.212.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.203.212.145.in-addr.arpa	name = 145.212.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.11.113.231 attackbots
Aug 29 14:05:58 vps647732 sshd[29570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.11.113.231
Aug 29 14:06:00 vps647732 sshd[29570]: Failed password for invalid user cym from 187.11.113.231 port 42472 ssh2
...
2020-08-30 02:01:07
218.92.0.249 attackbots
Aug 29 19:01:24 rocket sshd[21499]: Failed password for root from 218.92.0.249 port 45801 ssh2
Aug 29 19:01:37 rocket sshd[21499]: Failed password for root from 218.92.0.249 port 45801 ssh2
Aug 29 19:01:37 rocket sshd[21499]: error: maximum authentication attempts exceeded for root from 218.92.0.249 port 45801 ssh2 [preauth]
...
2020-08-30 02:01:56
109.244.100.99 attackbotsspam
Aug 29 09:05:49 ws24vmsma01 sshd[163838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.244.100.99
Aug 29 09:05:51 ws24vmsma01 sshd[163838]: Failed password for invalid user hien from 109.244.100.99 port 54458 ssh2
...
2020-08-30 02:01:20
113.64.36.204 attackbotsspam
Port probing on unauthorized port 2323
2020-08-30 02:20:20
46.34.128.58 attack
 TCP (SYN) 46.34.128.58:60841 -> port 445, len 52
2020-08-30 02:29:53
193.112.72.251 attack
Aug 29 14:05:47 h2427292 sshd\[1001\]: Invalid user roberto from 193.112.72.251
Aug 29 14:05:47 h2427292 sshd\[1001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.72.251 
Aug 29 14:05:48 h2427292 sshd\[1001\]: Failed password for invalid user roberto from 193.112.72.251 port 55524 ssh2
...
2020-08-30 02:13:05
51.77.200.101 attack
SSH
2020-08-30 02:00:28
49.88.112.71 attack
2020-08-29T18:01:39.376225shield sshd\[9948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=root
2020-08-29T18:01:40.716837shield sshd\[9948\]: Failed password for root from 49.88.112.71 port 28865 ssh2
2020-08-29T18:01:42.800200shield sshd\[9948\]: Failed password for root from 49.88.112.71 port 28865 ssh2
2020-08-29T18:01:45.286279shield sshd\[9948\]: Failed password for root from 49.88.112.71 port 28865 ssh2
2020-08-29T18:02:41.069754shield sshd\[10018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=root
2020-08-30 02:12:20
91.225.78.245 attackspam
20/8/29@08:06:01: FAIL: Alarm-Network address from=91.225.78.245
20/8/29@08:06:01: FAIL: Alarm-Network address from=91.225.78.245
...
2020-08-30 01:59:51
109.238.14.74 attackspambots
 UDP 109.238.14.74:5078 -> port 5061, len 442
2020-08-30 02:00:14
171.233.26.57 attackbots
Unauthorised access (Aug 29) SRC=171.233.26.57 LEN=52 TTL=112 ID=17897 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-30 02:17:06
112.85.42.94 attack
Aug 29 21:16:43 pkdns2 sshd\[50114\]: Failed password for root from 112.85.42.94 port 43617 ssh2Aug 29 21:16:45 pkdns2 sshd\[50114\]: Failed password for root from 112.85.42.94 port 43617 ssh2Aug 29 21:16:48 pkdns2 sshd\[50114\]: Failed password for root from 112.85.42.94 port 43617 ssh2Aug 29 21:17:40 pkdns2 sshd\[50150\]: Failed password for root from 112.85.42.94 port 32148 ssh2Aug 29 21:20:19 pkdns2 sshd\[50292\]: Failed password for root from 112.85.42.94 port 26600 ssh2Aug 29 21:23:01 pkdns2 sshd\[50358\]: Failed password for root from 112.85.42.94 port 28116 ssh2
...
2020-08-30 02:37:29
89.97.218.142 attack
*Port Scan* detected from 89.97.218.142 (IT/Italy/Lombardy/Milan/89-97-218-142.ip19.fastwebnet.it). 4 hits in the last 190 seconds
2020-08-30 02:02:20
190.52.232.48 attackbotsspam
Port probing on unauthorized port 2004
2020-08-30 02:00:52
185.142.236.35 attack
Hacking
2020-08-30 02:19:53

Recently Reported IPs

43.214.0.146 38.195.144.251 15.120.189.43 231.159.86.4
121.239.12.148 16.181.203.153 214.33.71.211 79.210.170.39
67.93.27.176 21.170.152.38 209.116.161.233 101.194.22.244
90.145.112.65 19.120.207.202 2.160.152.11 61.80.84.13
249.48.66.80 210.41.151.32 60.69.29.155 34.228.29.160