Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.27.13.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1725
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.27.13.97.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 03:13:00 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 97.13.27.145.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.82.98, trying next server
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 97.13.27.145.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
119.27.161.171 attack
Jun  3 22:15:36 fhem-rasp sshd[19759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.161.171  user=root
Jun  3 22:15:38 fhem-rasp sshd[19759]: Failed password for root from 119.27.161.171 port 44718 ssh2
...
2020-06-04 04:34:47
79.136.70.159 attackspambots
Jun  3 21:08:24 ajax sshd[5896]: Failed password for root from 79.136.70.159 port 44892 ssh2
2020-06-04 04:26:54
218.92.0.171 attackbotsspam
2020-06-03T20:10:34.851901shield sshd\[5939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
2020-06-03T20:10:36.018286shield sshd\[5939\]: Failed password for root from 218.92.0.171 port 4295 ssh2
2020-06-03T20:10:39.509401shield sshd\[5939\]: Failed password for root from 218.92.0.171 port 4295 ssh2
2020-06-03T20:10:42.742835shield sshd\[5939\]: Failed password for root from 218.92.0.171 port 4295 ssh2
2020-06-03T20:10:46.389787shield sshd\[5939\]: Failed password for root from 218.92.0.171 port 4295 ssh2
2020-06-04 04:15:30
189.2.141.83 attack
Automatic report BANNED IP
2020-06-04 04:06:13
222.186.169.194 attack
Jun  3 22:32:49 melroy-server sshd[28774]: Failed password for root from 222.186.169.194 port 7858 ssh2
Jun  3 22:32:53 melroy-server sshd[28774]: Failed password for root from 222.186.169.194 port 7858 ssh2
...
2020-06-04 04:34:32
220.178.31.90 attackspambots
Jun  3 14:39:25 eventyay sshd[17866]: Failed password for root from 220.178.31.90 port 57324 ssh2
Jun  3 14:43:37 eventyay sshd[17987]: Failed password for root from 220.178.31.90 port 56020 ssh2
...
2020-06-04 04:04:15
167.71.72.70 attack
Fail2Ban Ban Triggered (2)
2020-06-04 04:11:52
195.54.160.107 attackbots
Jun  3 19:05:02 webctf kernel: [405960.734307] [UFW BLOCK] IN=ens3 OUT= MAC=fa:16:3e:1e:56:95:da:da:88:24:bd:ed:08:00 SRC=195.54.160.107 DST=137.74.115.118 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=28235 PROTO=TCP SPT=8080 DPT=11009 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun  3 19:07:17 webctf kernel: [406095.682040] [UFW BLOCK] IN=ens3 OUT= MAC=fa:16:3e:1e:56:95:da:da:88:24:bd:ed:08:00 SRC=195.54.160.107 DST=137.74.115.118 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=16189 PROTO=TCP SPT=8080 DPT=11100 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun  3 19:15:03 webctf kernel: [406561.869224] [UFW BLOCK] IN=ens3 OUT= MAC=fa:16:3e:1e:56:95:da:da:88:24:bd:ed:08:00 SRC=195.54.160.107 DST=137.74.115.118 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=33103 PROTO=TCP SPT=8080 DPT=11242 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun  3 19:26:32 webctf kernel: [407250.819065] [UFW BLOCK] IN=ens3 OUT= MAC=fa:16:3e:1e:56:95:da:da:88:24:bd:ed:08:00 SRC=195.54.160.107 DST=137.74.115.118 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=2947 PROTO=TCP SPT=8080 
...
2020-06-04 04:26:20
196.189.255.15 attackbotsspam
SMB Server BruteForce Attack
2020-06-04 04:01:05
79.157.115.191 attackbotsspam
Website spammer of Join page
2020-06-04 04:33:53
66.70.173.63 attack
Jun  4 03:13:01 webhost01 sshd[12226]: Failed password for root from 66.70.173.63 port 57524 ssh2
...
2020-06-04 04:27:21
117.2.144.164 attackspam
Honeypot attack, port: 81, PTR: localhost.
2020-06-04 04:30:48
61.247.178.170 attack
Jun  3 22:10:59 legacy sshd[25816]: Failed password for root from 61.247.178.170 port 58628 ssh2
Jun  3 22:13:24 legacy sshd[25888]: Failed password for root from 61.247.178.170 port 35700 ssh2
...
2020-06-04 04:29:41
31.181.43.222 attackbots
IP 31.181.43.222 attacked honeypot on port: 8080 at 6/3/2020 12:46:34 PM
2020-06-04 04:09:38
220.122.65.160 attackspambots
xmlrpc attack
2020-06-04 04:25:12

Recently Reported IPs

177.200.64.188 132.87.39.177 8.169.229.121 41.53.221.7
56.223.148.190 216.136.7.60 12.6.249.201 14.21.53.45
54.118.222.125 225.254.215.45 113.28.10.227 220.246.28.57
194.250.107.40 155.87.220.194 241.169.31.250 181.26.105.16
64.169.42.20 242.208.152.217 117.193.172.157 164.68.242.198