Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: Noord Holland

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.3.105.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61794
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.3.105.73.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 17:54:54 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 73.105.3.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 73.105.3.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
86.102.11.128 attackspam
1,08-02/02 concatform PostRequest-Spammer scoring: lisboa
2019-08-04 00:18:01
182.254.163.139 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2019-08-03 23:19:12
115.159.86.75 attack
Aug  3 07:51:14 cac1d2 sshd\[9913\]: Invalid user stack from 115.159.86.75 port 35470
Aug  3 07:51:14 cac1d2 sshd\[9913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.86.75
Aug  3 07:51:16 cac1d2 sshd\[9913\]: Failed password for invalid user stack from 115.159.86.75 port 35470 ssh2
...
2019-08-03 23:12:22
62.168.92.206 attack
Unauthorized SSH login attempts
2019-08-03 23:10:42
49.88.112.60 attackbotsspam
Aug  3 17:17:30 rpi sshd[15675]: Failed password for root from 49.88.112.60 port 21136 ssh2
Aug  3 17:17:35 rpi sshd[15675]: Failed password for root from 49.88.112.60 port 21136 ssh2
2019-08-03 23:34:31
152.32.72.122 attack
Aug  3 15:38:17 db sshd\[32511\]: Invalid user xray from 152.32.72.122
Aug  3 15:38:17 db sshd\[32511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.72.122 
Aug  3 15:38:19 db sshd\[32511\]: Failed password for invalid user xray from 152.32.72.122 port 7569 ssh2
Aug  3 15:44:12 db sshd\[32587\]: Invalid user vijayaraj from 152.32.72.122
Aug  3 15:44:12 db sshd\[32587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.72.122 
...
2019-08-04 00:22:00
181.198.35.108 attackbots
Aug  3 16:35:53 debian sshd\[16184\]: Invalid user john from 181.198.35.108 port 53164
Aug  3 16:35:53 debian sshd\[16184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.198.35.108
...
2019-08-03 23:49:35
68.183.155.33 attack
2019-08-03T15:17:22.395475abusebot-7.cloudsearch.cf sshd\[16949\]: Invalid user monitor from 68.183.155.33 port 36812
2019-08-03 23:45:05
83.135.108.219 attack
Automatic report - Port Scan Attack
2019-08-04 00:06:22
183.82.99.139 attack
Aug  3 17:31:22 eventyay sshd[16514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.99.139
Aug  3 17:31:23 eventyay sshd[16514]: Failed password for invalid user net from 183.82.99.139 port 46936 ssh2
Aug  3 17:36:29 eventyay sshd[17715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.99.139
...
2019-08-04 00:21:09
177.39.218.144 attackbotsspam
Aug  3 16:06:51 microserver sshd[44468]: Invalid user ubuntu from 177.39.218.144 port 40201
Aug  3 16:06:51 microserver sshd[44468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.39.218.144
Aug  3 16:06:52 microserver sshd[44468]: Failed password for invalid user ubuntu from 177.39.218.144 port 40201 ssh2
Aug  3 16:14:06 microserver sshd[46148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.39.218.144
Aug  3 16:28:22 microserver sshd[50134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.39.218.144
Aug  3 16:35:38 microserver sshd[52542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.39.218.144
Aug  3 16:49:18 microserver sshd[56258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.39.218.144
Aug  3 17:24:50 microserver sshd[3942]: pam_unix(sshd:auth): authentication failure; logname= u
2019-08-04 00:25:46
78.136.95.189 attack
Aug  3 17:17:23 ubuntu-2gb-nbg1-dc3-1 sshd[14421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.136.95.189
Aug  3 17:17:24 ubuntu-2gb-nbg1-dc3-1 sshd[14421]: Failed password for invalid user tsadmin from 78.136.95.189 port 56528 ssh2
...
2019-08-03 23:42:56
117.50.19.227 attackspambots
/var/log/messages:Aug  1 19:37:34 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1564688254.464:134505): pid=5493 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aes256-ctr ksize=256 mac=hmac-sha1 pfs=ecdh-sha2-nistp256 spid=5494 suid=74 rport=49346 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=117.50.19.227 terminal=? res=success'
/var/log/messages:Aug  1 19:37:34 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1564688254.468:134506): pid=5493 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aes256-ctr ksize=256 mac=hmac-sha1 pfs=ecdh-sha2-nistp256 spid=5494 suid=74 rport=49346 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=117.50.19.227 terminal=? res=success'
/var/log/messages:Aug  1 19:37:35 sanyalnet-cloud-vps fail2ban.filter[5325]: INFO [sshd] Found 1........
-------------------------------
2019-08-04 00:32:43
163.172.160.182 attackspambots
Aug  3 18:17:24 site2 sshd\[9651\]: Invalid user cisco from 163.172.160.182Aug  3 18:17:26 site2 sshd\[9651\]: Failed password for invalid user cisco from 163.172.160.182 port 36710 ssh2Aug  3 18:17:31 site2 sshd\[9653\]: Invalid user c-comatic from 163.172.160.182Aug  3 18:17:34 site2 sshd\[9653\]: Failed password for invalid user c-comatic from 163.172.160.182 port 38102 ssh2Aug  3 18:17:41 site2 sshd\[9657\]: Failed password for root from 163.172.160.182 port 39178 ssh2
...
2019-08-03 23:28:50
104.140.188.6 attack
Automatic report - Port Scan Attack
2019-08-03 23:40:23

Recently Reported IPs

51.131.36.54 197.65.47.56 148.244.236.188 51.98.165.182
180.84.48.159 193.240.116.191 215.242.74.140 166.246.181.196
115.242.177.228 69.232.65.34 157.188.153.126 220.96.44.70
188.219.65.186 172.227.252.37 65.147.181.47 56.220.90.214
168.119.40.241 224.238.130.104 195.62.32.33 184.203.238.161