Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.213.26.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22596
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.213.26.137.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 13:13:09 CST 2025
;; MSG SIZE  rcvd: 107
Host info
137.26.213.145.in-addr.arpa domain name pointer 145.213.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.26.213.145.in-addr.arpa	name = 145.213.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.41.71.195 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 08:20:35
109.70.100.33 attack
none
2020-03-18 08:38:55
157.245.113.44 attack
SSH Invalid Login
2020-03-18 08:17:50
64.227.69.43 attack
SASL PLAIN auth failed: ruser=...
2020-03-18 08:30:27
107.180.109.50 attackbotsspam
xmlrpc attack
2020-03-18 08:17:18
138.118.100.149 attackbots
Automatic report - Port Scan Attack
2020-03-18 08:43:49
73.14.123.172 attackbots
Wordpress login scanning
2020-03-18 08:39:26
212.87.220.210 attack
2020-03-17T19:16:42.715047+01:00 lumpi kernel: [9758798.035102] INPUT:DROP:SPAMHAUS_DROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=212.87.220.210 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=68 ID=1982 DF PROTO=TCP SPT=22583 DPT=25 WINDOW=29200 RES=0x00 SYN URGP=0 
...
2020-03-18 08:29:45
14.18.103.163 attackspambots
Brute force SMTP login attempted.
...
2020-03-18 08:48:32
183.33.71.235 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 08:47:45
194.26.29.113 attack
Mar 18 01:08:51 debian-2gb-nbg1-2 kernel: \[6749245.383084\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.113 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=34658 PROTO=TCP SPT=55689 DPT=1751 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-18 08:16:35
189.15.144.235 attackbots
Automatic report - Port Scan Attack
2020-03-18 08:25:21
58.141.232.44 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 08:27:03
36.236.138.132 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 08:44:42
45.55.177.170 attack
SSH Invalid Login
2020-03-18 08:09:41

Recently Reported IPs

47.88.55.208 20.79.181.57 85.36.232.103 108.37.41.179
231.168.126.24 73.82.219.3 220.71.45.206 43.167.212.71
210.204.1.16 145.248.144.169 61.231.72.209 28.184.45.188
79.26.154.252 250.135.169.116 251.124.196.174 227.187.89.157
220.67.246.247 231.129.243.11 223.15.255.143 77.76.45.165