Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: North Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: IP Volume inc

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
145.249.107.235 attackbots
5900/tcp 5900/tcp
[2020-05-07/08]2pkt
2020-05-10 01:59:15
145.249.107.171 attack
Mar 24 14:06:26 ns3042688 courier-pop3d: LOGIN FAILED, user=info@sikla-systems.com, ip=\[::ffff:145.249.107.171\]
...
2020-03-25 02:14:30
145.249.107.44 attackspam
Dec 30 09:25:57 v22018076622670303 sshd\[19000\]: Invalid user Ohto from 145.249.107.44 port 55488
Dec 30 09:25:57 v22018076622670303 sshd\[19000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.249.107.44
Dec 30 09:25:59 v22018076622670303 sshd\[19000\]: Failed password for invalid user Ohto from 145.249.107.44 port 55488 ssh2
...
2019-12-30 18:40:37
145.249.107.242 attackspambots
SASL LOGIN authentication failed: authentication failure
2019-08-05 14:45:17
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.249.107.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5928
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.249.107.134.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 13 10:21:35 +08 2019
;; MSG SIZE  rcvd: 119

Host info
Host 134.107.249.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.107.249.145.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
198.108.67.29 attack
22/tcp 623/tcp 83/tcp...
[2020-03-07/05-05]19pkt,17pt.(tcp)
2020-05-06 00:34:31
142.93.130.58 attackbots
2020-05-05T15:24:59.471504homeassistant sshd[14710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.130.58  user=root
2020-05-05T15:25:01.392977homeassistant sshd[14710]: Failed password for root from 142.93.130.58 port 38798 ssh2
...
2020-05-06 00:12:47
190.140.97.245 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-05-06 00:31:20
192.185.131.136 attack
Automatic report - XMLRPC Attack
2020-05-06 00:46:05
46.101.253.249 attack
May  5 17:54:54 rotator sshd\[32057\]: Invalid user catchall from 46.101.253.249May  5 17:54:56 rotator sshd\[32057\]: Failed password for invalid user catchall from 46.101.253.249 port 38041 ssh2May  5 17:58:46 rotator sshd\[389\]: Invalid user anni from 46.101.253.249May  5 17:58:48 rotator sshd\[389\]: Failed password for invalid user anni from 46.101.253.249 port 35680 ssh2May  5 18:02:23 rotator sshd\[1235\]: Invalid user foobar from 46.101.253.249May  5 18:02:25 rotator sshd\[1235\]: Failed password for invalid user foobar from 46.101.253.249 port 33189 ssh2
...
2020-05-06 00:10:12
93.189.217.84 attackspambots
bruteforce detected
2020-05-06 00:16:48
223.186.75.181 attackbotsspam
Unauthorized connection attempt from IP address 223.186.75.181 on Port 445(SMB)
2020-05-06 00:29:55
198.108.67.36 attack
firewall-block, port(s): 4002/tcp
2020-05-06 00:15:55
51.68.123.198 attack
2020-05-05 02:13:43 server sshd[19610]: Failed password for invalid user root from 51.68.123.198 port 55082 ssh2
2020-05-06 00:21:20
1.1.214.80 attackbots
Unauthorized connection attempt from IP address 1.1.214.80 on Port 445(SMB)
2020-05-06 00:29:33
114.46.181.214 attackspam
Unauthorized connection attempt from IP address 114.46.181.214 on Port 445(SMB)
2020-05-06 00:33:43
41.69.234.184 attackbotsspam
Unauthorized connection attempt from IP address 41.69.234.184 on Port 445(SMB)
2020-05-06 00:23:02
5.121.89.236 attackbotsspam
Unauthorized connection attempt from IP address 5.121.89.236 on Port 445(SMB)
2020-05-06 00:40:39
114.67.105.220 attack
Lines containing failures of 114.67.105.220
May  5 10:54:43 linuxrulz sshd[31654]: Invalid user neha from 114.67.105.220 port 53934
May  5 10:54:43 linuxrulz sshd[31654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.105.220 
May  5 10:54:45 linuxrulz sshd[31654]: Failed password for invalid user neha from 114.67.105.220 port 53934 ssh2
May  5 10:54:46 linuxrulz sshd[31654]: Received disconnect from 114.67.105.220 port 53934:11: Bye Bye [preauth]
May  5 10:54:46 linuxrulz sshd[31654]: Disconnected from invalid user neha 114.67.105.220 port 53934 [preauth]
May  5 11:10:43 linuxrulz sshd[1912]: Invalid user client from 114.67.105.220 port 51008
May  5 11:10:43 linuxrulz sshd[1912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.105.220 
May  5 11:10:45 linuxrulz sshd[1912]: Failed password for invalid user client from 114.67.105.220 port 51008 ssh2
May  5 11:10:46 linuxrulz ssh........
------------------------------
2020-05-06 00:27:16
175.6.35.82 attackspam
May  5 17:51:31 piServer sshd[16466]: Failed password for root from 175.6.35.82 port 57204 ssh2
May  5 17:58:51 piServer sshd[17052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.35.82 
May  5 17:58:53 piServer sshd[17052]: Failed password for invalid user ian from 175.6.35.82 port 37972 ssh2
...
2020-05-06 00:39:19

Recently Reported IPs

51.219.58.141 193.165.247.107 197.51.132.142 78.193.122.129
41.214.20.60 159.89.194.160 104.248.117.10 76.186.18.74
106.58.218.102 37.144.111.151 193.39.187.110 185.208.209.6
88.225.26.160 177.126.18.200 185.244.25.113 92.53.65.42
86.194.233.1 129.213.153.229 202.83.56.245 168.181.50.67