Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.33.138.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32233
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.33.138.97.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 20:13:11 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 97.138.33.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 97.138.33.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.219.80.247 attackspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-16 04:22:56
23.100.80.45 attackbots
Jul 15 21:55:55 vmd17057 sshd[5725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.100.80.45 
Jul 15 21:55:57 vmd17057 sshd[5725]: Failed password for invalid user admin from 23.100.80.45 port 52010 ssh2
...
2020-07-16 04:04:22
196.171.41.203 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-16 04:26:20
185.200.118.67 attack
firewall-block, port(s): 1723/tcp
2020-07-16 04:11:00
192.3.163.120 attackspambots
Jul 15 14:04:51 Tower sshd[28787]: Connection from 192.3.163.120 port 48258 on 192.168.10.220 port 22 rdomain ""
Jul 15 14:04:55 Tower sshd[28787]: Invalid user djz from 192.3.163.120 port 48258
Jul 15 14:04:55 Tower sshd[28787]: error: Could not get shadow information for NOUSER
Jul 15 14:04:55 Tower sshd[28787]: Failed password for invalid user djz from 192.3.163.120 port 48258 ssh2
Jul 15 14:04:55 Tower sshd[28787]: Received disconnect from 192.3.163.120 port 48258:11: Bye Bye [preauth]
Jul 15 14:04:55 Tower sshd[28787]: Disconnected from invalid user djz 192.3.163.120 port 48258 [preauth]
2020-07-16 04:22:26
91.225.158.230 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-16 04:17:36
37.19.86.199 attackbotsspam
IP 37.19.86.199 attacked honeypot on port: 1433 at 7/15/2020 6:00:25 AM
2020-07-16 04:12:19
196.15.211.92 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-16 04:04:36
52.187.53.102 attackbotsspam
Jul 15 22:31:58 lnxmysql61 sshd[10480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.53.102
Jul 15 22:31:58 lnxmysql61 sshd[10480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.53.102
2020-07-16 04:32:31
52.148.254.76 attackspambots
Jul 15 15:09:20 main sshd[24954]: Failed password for invalid user admin from 52.148.254.76 port 16229 ssh2
Jul 15 18:19:46 main sshd[28563]: Failed password for invalid user eugenemolotov.ru from 52.148.254.76 port 47537 ssh2
Jul 15 18:19:46 main sshd[28564]: Failed password for invalid user eugenemolotov from 52.148.254.76 port 47536 ssh2
2020-07-16 04:32:59
193.112.77.212 attackspambots
Bruteforce detected by fail2ban
2020-07-16 04:15:37
129.204.177.7 attack
2020-07-15T15:27:35.044516vps2034 sshd[22040]: Invalid user eks from 129.204.177.7 port 49336
2020-07-15T15:27:35.049490vps2034 sshd[22040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.177.7
2020-07-15T15:27:35.044516vps2034 sshd[22040]: Invalid user eks from 129.204.177.7 port 49336
2020-07-15T15:27:37.201786vps2034 sshd[22040]: Failed password for invalid user eks from 129.204.177.7 port 49336 ssh2
2020-07-15T15:32:01.744778vps2034 sshd[389]: Invalid user partner from 129.204.177.7 port 40794
...
2020-07-16 04:38:09
165.225.38.46 attack
A Network Trojan was Detected. Signature ET TROJAN Possible Windows executable sent when remote host claims to send a Text File.
2020-07-16 04:03:20
216.126.231.15 attack
Jul 15 20:30:42 eventyay sshd[24736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.126.231.15
Jul 15 20:30:43 eventyay sshd[24736]: Failed password for invalid user shirleen from 216.126.231.15 port 60536 ssh2
Jul 15 20:37:24 eventyay sshd[24900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.126.231.15
...
2020-07-16 04:06:40
37.187.106.104 attackspambots
prod6
...
2020-07-16 04:34:40

Recently Reported IPs

59.16.103.171 93.210.73.43 73.115.102.180 247.74.12.194
54.76.241.165 230.27.230.95 121.70.59.144 31.172.174.175
131.18.109.66 155.127.32.217 179.28.155.70 178.184.175.190
14.15.212.234 150.79.6.184 6.5.153.7 168.137.151.63
205.67.188.157 6.249.188.94 216.233.76.6 237.94.210.252