Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.214.97.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.214.97.40.			IN	A

;; AUTHORITY SECTION:
.			202	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032601 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 06:02:31 CST 2020
;; MSG SIZE  rcvd: 117
Host info
40.97.214.145.in-addr.arpa domain name pointer 145.214.early-registration.of.surfnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.97.214.145.in-addr.arpa	name = 145.214.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.56.28.237 attackspam
Oct 6 07:23:56 *hidden* postfix/postscreen[49386]: DNSBL rank 3 for [193.56.28.237]:57440
2020-10-10 23:53:26
213.32.20.107 attackspambots
[FriOct0922:46:53.9544382020][:error][pid13734:tid47492339201792][client213.32.20.107:60276][client213.32.20.107]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\$mozilla\^\|mozilla/[45]\\\\\\\\.[1-9]\|\^mozilla/4\\\\\\\\.0\$\)"atREQUEST_HEADERS:User-Agent.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"426"][id"330131"][rev"3"][msg"Atomicorp.comWAFRules:MaliciousBotBlocked\(FakeMozillaUserAgentStringDetected\)"][severity"CRITICAL"][hostname"casacarmen.ch"][uri"/assets/images/index3.php"][unique_id"X4DMPS6@5kokbyAF6s8mwAAAAMY"]\,referer:casacarmen.ch[FriOct0922:48:07.3235822020][:error][pid14616:tid47492349708032][client213.32.20.107:37542][client213.32.20.107]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\$mozilla\^\|mozilla/[45]\\\\\\\\.[1-9]\|\^mozilla/4\\\\\\\\.0\$\)"atREQUEST_HEADERS:User-Agent.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"426"][id"330131"][rev"3"][msg"Atomicorp.comW
2020-10-10 23:27:36
208.100.26.236 attackbotsspam
Sep 16 09:24:35 *hidden* postfix/postscreen[44035]: DNSBL rank 3 for [208.100.26.236]:35176
2020-10-10 23:43:10
2.57.122.209 attack
Sep 10 16:11:05 *hidden* postfix/postscreen[11034]: DNSBL rank 4 for [2.57.122.209]:55941
2020-10-10 23:47:57
120.36.25.214 attackspambots
Oct 10 00:33:07 mavik sshd[20477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.36.25.214  user=root
Oct 10 00:33:09 mavik sshd[20477]: Failed password for root from 120.36.25.214 port 21583 ssh2
Oct 10 00:35:59 mavik sshd[20585]: Invalid user radvd from 120.36.25.214
Oct 10 00:35:59 mavik sshd[20585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.36.25.214
Oct 10 00:36:01 mavik sshd[20585]: Failed password for invalid user radvd from 120.36.25.214 port 24570 ssh2
...
2020-10-11 00:04:18
156.96.156.37 attack
[2020-10-10 10:51:33] NOTICE[1182][C-000028b8] chan_sip.c: Call from '' (156.96.156.37:49172) to extension '46842002803' rejected because extension not found in context 'public'.
[2020-10-10 10:51:33] SECURITY[1204] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-10-10T10:51:33.315-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="46842002803",SessionID="0x7f22f8572958",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/156.96.156.37/49172",ACLName="no_extension_match"
[2020-10-10 10:53:21] NOTICE[1182][C-000028bc] chan_sip.c: Call from '' (156.96.156.37:56166) to extension '01146842002803' rejected because extension not found in context 'public'.
[2020-10-10 10:53:21] SECURITY[1204] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-10-10T10:53:21.510-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146842002803",SessionID="0x7f22f840cf98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/156.96.156
...
2020-10-10 23:57:49
139.59.159.0 attackspam
Invalid user rr from 139.59.159.0 port 57936
2020-10-10 23:56:49
78.188.21.128 attack
DATE:2020-10-10 17:08:28, IP:78.188.21.128, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-10-10 23:34:49
117.5.154.177 attackbots
1602276465 - 10/09/2020 22:47:45 Host: 117.5.154.177/117.5.154.177 Port: 445 TCP Blocked
2020-10-11 00:12:31
82.62.153.15 attack
Invalid user info from 82.62.153.15 port 60873
2020-10-11 00:10:17
84.92.92.196 attack
prod11
...
2020-10-11 00:04:34
117.192.225.203 attackbotsspam
Lines containing failures of 117.192.225.203
Oct  9 22:44:50 kopano sshd[7427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.192.225.203  user=r.r
Oct  9 22:44:52 kopano sshd[7427]: Failed password for r.r from 117.192.225.203 port 57126 ssh2
Oct  9 22:44:52 kopano sshd[7427]: Received disconnect from 117.192.225.203 port 57126:11: Bye Bye [preauth]
Oct  9 22:44:52 kopano sshd[7427]: Disconnected from authenticating user r.r 117.192.225.203 port 57126 [preauth]
Oct  9 23:02:50 kopano sshd[8052]: Invalid user test123 from 117.192.225.203 port 54302
Oct  9 23:02:50 kopano sshd[8052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.192.225.203
Oct  9 23:02:51 kopano sshd[8052]: Failed password for invalid user test123 from 117.192.225.203 port 54302 ssh2
Oct  9 23:02:52 kopano sshd[8052]: Received disconnect from 117.192.225.203 port 54302:11: Bye Bye [preauth]
Oct  9 23:02:52 kopano ........
------------------------------
2020-10-10 23:51:12
193.169.253.169 attackspambots
Sep 13 15:18:22 *hidden* postfix/postscreen[16414]: DNSBL rank 3 for [193.169.253.169]:42332
2020-10-10 23:56:18
134.17.94.55 attackspambots
Oct 10 18:36:47 hosting sshd[5144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.55  user=root
Oct 10 18:36:49 hosting sshd[5144]: Failed password for root from 134.17.94.55 port 3918 ssh2
...
2020-10-11 00:08:26
171.245.84.238 attackspambots
Brute forcing email accounts
2020-10-10 23:32:04

Recently Reported IPs

57.66.183.22 36.200.78.243 15.172.241.135 19.147.193.212
70.37.75.42 212.214.181.153 206.201.249.148 49.189.52.117
108.149.239.132 119.17.80.0 174.255.5.109 81.0.63.124
106.12.150.169 212.214.114.11 64.167.108.240 49.216.164.202
200.29.111.182 191.163.215.26 60.98.33.216 137.43.238.78