Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.5.113.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63021
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.5.113.142.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112500 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 25 17:03:45 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 142.113.5.145.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 145.5.113.142.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
110.185.164.162 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-02 04:00:42
182.188.175.104 attackspam
Attempted connection to port 21.
2020-05-02 03:47:34
180.76.54.86 attack
May  1 22:11:34 vps sshd[811586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.54.86  user=root
May  1 22:11:36 vps sshd[811586]: Failed password for root from 180.76.54.86 port 50192 ssh2
May  1 22:15:55 vps sshd[834396]: Invalid user yangli from 180.76.54.86 port 49484
May  1 22:15:55 vps sshd[834396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.54.86
May  1 22:15:57 vps sshd[834396]: Failed password for invalid user yangli from 180.76.54.86 port 49484 ssh2
...
2020-05-02 04:21:56
185.50.149.11 attack
'IP reached maximum auth failures for a one day block'
2020-05-02 04:08:35
157.48.24.202 attackbotsspam
445/tcp
[2020-05-01]1pkt
2020-05-02 04:07:28
210.212.97.243 attack
Unauthorized connection attempt from IP address 210.212.97.243 on Port 445(SMB)
2020-05-02 04:06:33
95.154.173.234 attackbotsspam
Unauthorized connection attempt from IP address 95.154.173.234 on Port 445(SMB)
2020-05-02 04:23:21
162.243.136.81 attackbotsspam
9030/tcp
[2020-05-01]1pkt
2020-05-02 03:50:57
193.118.53.213 attackspam
Attempted connection to port 2083.
2020-05-02 03:47:01
36.71.238.101 attackspambots
1588354877 - 05/01/2020 19:41:17 Host: 36.71.238.101/36.71.238.101 Port: 445 TCP Blocked
2020-05-02 04:12:06
186.139.154.14 attack
Invalid user cafe24 from 186.139.154.14 port 36838
2020-05-02 03:57:12
178.77.21.149 attack
Unauthorized connection attempt detected from IP address 178.77.21.149 to port 23
2020-05-02 03:49:00
95.26.154.82 attackspambots
Unauthorized connection attempt from IP address 95.26.154.82 on Port 445(SMB)
2020-05-02 04:15:30
94.25.228.85 attackbots
445/tcp
[2020-05-01]1pkt
2020-05-02 04:10:21
40.118.203.142 attackbots
W 31101,/var/log/nginx/access.log,-,-
2020-05-02 04:05:53

Recently Reported IPs

103.162.105.82 135.155.11.153 26.15.121.112 67.176.29.55
151.60.14.78 139.108.100.213 136.49.207.222 200.14.103.15
3.119.33.60 210.50.201.137 44.121.128.70 46.202.130.82
107.93.235.178 161.227.176.212 173.12.122.14 151.157.44.206
232.82.72.157 238.14.77.156 64.12.173.102 31.6.228.164