Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.44.91.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.44.91.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 20:04:25 CST 2025
;; MSG SIZE  rcvd: 105
Host info
48.91.44.145.in-addr.arpa domain name pointer 91-48.dhcp.windesheim.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.91.44.145.in-addr.arpa	name = 91-48.dhcp.windesheim.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
64.225.75.103 attackspam
Unauthorized connection attempt detected, IP banned.
2020-04-12 13:33:29
178.128.144.14 attackbots
Apr 12 07:03:36 markkoudstaal sshd[14462]: Failed password for root from 178.128.144.14 port 40196 ssh2
Apr 12 07:07:31 markkoudstaal sshd[15043]: Failed password for root from 178.128.144.14 port 47644 ssh2
2020-04-12 13:25:22
46.35.19.18 attack
Apr 12 06:13:02 sso sshd[7437]: Failed password for root from 46.35.19.18 port 37631 ssh2
...
2020-04-12 13:26:19
168.62.53.23 attackspambots
(mod_security) mod_security (id:210492) triggered by 168.62.53.23 (US/United States/-): 5 in the last 300 secs
2020-04-12 13:07:21
83.234.149.64 attack
1586663813 - 04/12/2020 05:56:53 Host: 83.234.149.64/83.234.149.64 Port: 445 TCP Blocked
2020-04-12 13:40:05
167.99.66.193 attackbots
Apr 12 06:37:44 ewelt sshd[29201]: Failed password for invalid user spotlight from 167.99.66.193 port 35935 ssh2
Apr 12 06:41:04 ewelt sshd[29469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.66.193  user=root
Apr 12 06:41:06 ewelt sshd[29469]: Failed password for root from 167.99.66.193 port 34642 ssh2
Apr 12 06:44:21 ewelt sshd[29616]: Invalid user pass from 167.99.66.193 port 33346
...
2020-04-12 13:36:48
118.25.125.189 attackspambots
Apr 12 07:19:39  sshd[14339]: Failed password for invalid user app from 118.25.125.189 port 44346 ssh2
2020-04-12 13:32:54
110.88.127.2 attackbots
prod6
...
2020-04-12 13:15:08
186.32.130.243 attackspambots
Automatic report - XMLRPC Attack
2020-04-12 13:38:20
160.19.136.83 attack
Unauthorised access (Apr 12) SRC=160.19.136.83 LEN=52 TTL=113 ID=12594 DF TCP DPT=445 WINDOW=8192 SYN
2020-04-12 13:41:55
211.137.254.221 attackbotsspam
fail2ban -- 211.137.254.221
...
2020-04-12 13:37:46
183.131.113.141 attack
183.131.113.141 - - \[12/Apr/2020:05:56:55 +0200\] "GET http://api.gxout.com/proxy/check.aspx HTTP/1.1" 400 666 "http://api.gxout.com/proxy/check.aspx" "Mozilla/4.0 \(compatible\; MSIE 6.0\; Windows NT 5.1\)"
...
2020-04-12 13:36:25
69.158.207.141 attackspam
20/4/12@01:19:40: FAIL: IoT-SSH address from=69.158.207.141
...
2020-04-12 13:31:26
175.158.233.135 attack
IP has been reported several times for  Honeypot attack, port: 445, Scanning random ports - tries to find possible vulnerable services, Unauthorized connection attempt from IP address 175.158.233.140 on Port 445(SMB) and trying to hack Google accounts
2020-04-12 13:12:20
140.143.228.227 attackbotsspam
$f2bV_matches
2020-04-12 13:28:45

Recently Reported IPs

79.51.70.209 74.101.116.62 96.166.144.19 253.55.169.221
242.28.31.2 207.48.38.144 187.236.55.32 250.172.42.37
215.176.228.97 164.142.215.39 18.27.34.199 167.5.40.217
30.18.162.209 72.95.193.1 253.119.69.10 243.45.139.93
141.211.149.208 137.54.60.31 212.46.227.203 115.223.134.125