Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: SURFnet bv

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.217.211.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64677
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.217.211.119.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jul 13 23:27:05 CST 2019
;; MSG SIZE  rcvd: 119
Host info
119.211.217.145.in-addr.arpa domain name pointer 145.217.early-registration.of.surfnet.invalid.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
119.211.217.145.in-addr.arpa	name = 145.217.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.203.197.10 attackbotsspam
firewall-block, port(s): 81/tcp
2019-11-06 22:38:48
182.61.175.96 attackspambots
Nov  6 04:34:58 wbs sshd\[1541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.175.96  user=root
Nov  6 04:35:00 wbs sshd\[1541\]: Failed password for root from 182.61.175.96 port 38358 ssh2
Nov  6 04:38:40 wbs sshd\[1890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.175.96  user=root
Nov  6 04:38:42 wbs sshd\[1890\]: Failed password for root from 182.61.175.96 port 45294 ssh2
Nov  6 04:42:21 wbs sshd\[2301\]: Invalid user ubuntu from 182.61.175.96
2019-11-06 22:50:36
40.70.205.115 attackspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-11-06 22:24:41
165.227.69.39 attackspam
2019-11-06T09:13:26.035128abusebot-5.cloudsearch.cf sshd\[5608\]: Invalid user vic from 165.227.69.39 port 39267
2019-11-06 22:08:20
115.78.15.98 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 06-11-2019 06:20:22.
2019-11-06 22:06:22
180.129.25.75 attack
firewall-block, port(s): 8080/tcp
2019-11-06 22:11:14
115.94.207.204 attack
3 failed emails per dmarc_support@corp.mail.ru [Tue Nov 05 00:00:00 2019 GMT thru Wed Nov 06 00:00:00 2019 GMT]
2019-11-06 22:35:40
66.70.160.187 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2019-11-06 22:39:57
195.154.189.8 attackbots
11/06/2019-05:41:34.164858 195.154.189.8 Protocol: 17 ET SCAN Sipvicious Scan
2019-11-06 22:07:21
13.72.67.11 attack
WordPress Marketplace Remote Code Execution Vulnerability CVE-2017-17043, PTR: PTR record not found
2019-11-06 22:27:45
122.169.101.99 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 06-11-2019 06:20:24.
2019-11-06 22:04:19
145.239.86.21 attackspambots
Nov  6 15:38:17 SilenceServices sshd[28890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.86.21
Nov  6 15:38:19 SilenceServices sshd[28890]: Failed password for invalid user tevreau!@#$%tevreau from 145.239.86.21 port 41450 ssh2
Nov  6 15:41:57 SilenceServices sshd[31310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.86.21
2019-11-06 22:48:33
27.254.194.99 attackbotsspam
Nov  6 15:18:27 DAAP sshd[6726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.194.99  user=root
Nov  6 15:18:29 DAAP sshd[6726]: Failed password for root from 27.254.194.99 port 46172 ssh2
Nov  6 15:23:09 DAAP sshd[6767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.194.99  user=root
Nov  6 15:23:11 DAAP sshd[6767]: Failed password for root from 27.254.194.99 port 56602 ssh2
...
2019-11-06 22:29:51
46.234.255.115 attackspam
Unauthorised access (Nov  6) SRC=46.234.255.115 LEN=40 TTL=247 ID=23144 TCP DPT=445 WINDOW=1024 SYN 
Unauthorised access (Nov  5) SRC=46.234.255.115 LEN=40 TTL=247 ID=7726 TCP DPT=1433 WINDOW=1024 SYN
2019-11-06 22:31:01
77.139.0.204 attack
Nov  6 07:20:08 [host] sshd[8356]: Invalid user test from 77.139.0.204
Nov  6 07:20:08 [host] sshd[8356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.139.0.204
Nov  6 07:20:10 [host] sshd[8356]: Failed password for invalid user test from 77.139.0.204 port 48704 ssh2
2019-11-06 22:11:35

Recently Reported IPs

155.159.61.201 221.96.134.39 158.69.242.241 2003:cf:6705:e200:41d8:17f:1c74:f541
212.182.92.130 204.236.182.114 86.206.201.133 166.167.190.229
166.167.190.115 38.67.71.66 166.167.190.93 142.44.142.136
151.60.100.65 166.167.190.141 53.40.204.138 166.167.190.18
164.61.242.70 2001:44c8:4700:1a43:1:0:7e71:3ab7 117.211.86.109 75.163.58.173