Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.216.54.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34187
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.216.54.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011400 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 14 15:04:50 CST 2025
;; MSG SIZE  rcvd: 107
Host info
194.54.216.145.in-addr.arpa domain name pointer 145.216.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.54.216.145.in-addr.arpa	name = 145.216.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.208.116.156 attack
Unauthorized connection attempt from IP address 187.208.116.156 on Port 445(SMB)
2020-02-08 23:42:36
190.38.89.233 attack
445/tcp
[2020-02-08]1pkt
2020-02-08 23:18:14
212.129.30.110 attackspambots
SIPVicious Scanner Detection
2020-02-08 23:03:02
176.217.227.110 attackbotsspam
8080/tcp
[2020-02-08]1pkt
2020-02-08 23:08:11
210.74.13.5 attack
Feb  8 15:56:20 markkoudstaal sshd[15118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.74.13.5
Feb  8 15:56:22 markkoudstaal sshd[15118]: Failed password for invalid user zzs from 210.74.13.5 port 40852 ssh2
Feb  8 15:59:10 markkoudstaal sshd[15592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.74.13.5
2020-02-08 23:11:38
189.50.201.202 attack
23/tcp
[2020-02-08]1pkt
2020-02-08 23:24:06
222.124.124.148 attack
22/tcp 8291/tcp 8291/tcp
[2020-02-08]3pkt
2020-02-08 23:37:15
86.19.89.36 attackbotsspam
64068/udp
[2020-02-08]1pkt
2020-02-08 23:03:55
5.214.118.166 attackspambots
Unauthorized connection attempt from IP address 5.214.118.166 on Port 445(SMB)
2020-02-08 23:25:42
118.175.134.201 attack
Unauthorized connection attempt from IP address 118.175.134.201 on Port 445(SMB)
2020-02-08 23:46:30
212.47.253.178 attack
Feb  8 11:27:12 firewall sshd[22871]: Invalid user kie from 212.47.253.178
Feb  8 11:27:14 firewall sshd[22871]: Failed password for invalid user kie from 212.47.253.178 port 53792 ssh2
Feb  8 11:30:25 firewall sshd[23029]: Invalid user ghx from 212.47.253.178
...
2020-02-08 23:14:47
31.148.24.75 attackspambots
Unauthorized connection attempt from IP address 31.148.24.75 on Port 445(SMB)
2020-02-08 23:09:41
51.15.3.29 attack
Automatic report - Port Scan Attack
2020-02-08 23:06:10
222.186.15.158 attack
2020-02-08T10:28:16.367861vostok sshd\[7806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root | Triggered by Fail2Ban at Vostok web server
2020-02-08 23:40:37
46.105.132.32 attack
Unauthorized connection attempt from IP address 46.105.132.32 on Port 445(SMB)
2020-02-08 23:12:52

Recently Reported IPs

118.148.79.178 226.168.101.192 56.239.231.225 230.105.129.174
51.137.65.145 135.148.12.52 211.179.141.187 18.238.153.110
185.224.173.122 142.146.131.14 167.105.190.35 40.247.42.148
10.10.10.177 214.227.121.154 206.63.82.40 96.30.115.158
253.91.28.254 58.136.131.82 59.165.235.215 26.21.74.182