Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.22.184.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24619
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.22.184.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:00:30 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 45.184.22.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.184.22.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.161.78.70 attackbots
Jun  7 21:42:38 hosting sshd[22024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.161.78.70  user=root
Jun  7 21:42:39 hosting sshd[22024]: Failed password for root from 112.161.78.70 port 61500 ssh2
...
2020-06-08 02:45:43
183.88.240.192 attackspam
Unauthorized connection attempt from IP address 183.88.240.192 on Port 445(SMB)
2020-06-08 03:00:27
117.50.77.220 attack
Jun  7 03:11:22 php1 sshd\[5589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.77.220  user=root
Jun  7 03:11:25 php1 sshd\[5589\]: Failed password for root from 117.50.77.220 port 23945 ssh2
Jun  7 03:14:38 php1 sshd\[5816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.77.220  user=root
Jun  7 03:14:40 php1 sshd\[5816\]: Failed password for root from 117.50.77.220 port 61779 ssh2
Jun  7 03:17:54 php1 sshd\[6043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.77.220  user=root
2020-06-08 02:58:32
171.226.171.52 attackbots
Port probing on unauthorized port 23
2020-06-08 02:55:43
185.134.168.1 attackbotsspam
Ref: mx Logwatch report
2020-06-08 03:04:23
194.84.110.135 attackspambots
Port probing on unauthorized port 4899
2020-06-08 02:37:30
211.38.132.36 attackspam
5x Failed Password
2020-06-08 03:10:45
201.187.99.212 attackbotsspam
 TCP (SYN) 201.187.99.212:25818 -> port 80, len 44
2020-06-08 03:03:18
45.88.159.2 attackspam
Ref: mx Logwatch report
2020-06-08 03:09:35
111.251.10.9 attackspambots
scan z
2020-06-08 02:58:57
31.222.5.80 attackbots
Ref: mx Logwatch report
2020-06-08 03:10:24
188.166.147.211 attackbotsspam
Jun  7 21:40:27 web1 sshd[18792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.147.211  user=root
Jun  7 21:40:30 web1 sshd[18792]: Failed password for root from 188.166.147.211 port 44370 ssh2
Jun  7 21:48:17 web1 sshd[20631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.147.211  user=root
Jun  7 21:48:19 web1 sshd[20631]: Failed password for root from 188.166.147.211 port 53634 ssh2
Jun  7 21:53:11 web1 sshd[21833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.147.211  user=root
Jun  7 21:53:12 web1 sshd[21833]: Failed password for root from 188.166.147.211 port 55922 ssh2
Jun  7 21:58:06 web1 sshd[23019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.147.211  user=root
Jun  7 21:58:08 web1 sshd[23019]: Failed password for root from 188.166.147.211 port 58200 ssh2
Jun  7 22:02:49 web1
...
2020-06-08 02:52:03
175.24.107.68 attackspam
2020-06-07T15:08:37.988154rocketchat.forhosting.nl sshd[7867]: Failed password for root from 175.24.107.68 port 39188 ssh2
2020-06-07T15:12:54.298437rocketchat.forhosting.nl sshd[7911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.107.68  user=root
2020-06-07T15:12:56.358716rocketchat.forhosting.nl sshd[7911]: Failed password for root from 175.24.107.68 port 38430 ssh2
...
2020-06-08 03:01:24
159.89.167.59 attackbotsspam
Jun  7 16:38:03 ajax sshd[19800]: Failed password for root from 159.89.167.59 port 51336 ssh2
2020-06-08 02:38:46
195.54.167.120 attackbotsspam
06/07/2020-14:44:16.107620 195.54.167.120 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-08 02:57:36

Recently Reported IPs

205.174.145.54 57.160.27.57 196.25.78.249 50.121.159.2
30.67.81.95 243.198.86.83 74.25.78.55 88.122.169.61
234.194.236.137 79.232.182.65 159.167.54.193 38.233.9.198
237.157.223.131 127.131.162.85 156.43.76.222 232.185.32.42
144.101.82.250 9.150.34.181 226.109.81.163 229.103.170.148