Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Leidschendam

Region: Zuid Holland

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.52.116.230
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60087
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.52.116.230.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032201 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 23 08:13:15 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 230.116.52.145.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 145.52.116.230.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
209.141.40.237 attackbotsspam
Port Scan
...
2020-09-08 23:21:53
112.11.231.240 attackbots
 TCP (SYN) 112.11.231.240:52830 -> port 23, len 44
2020-09-08 23:40:12
121.3.28.166 attack
Brute Force
2020-09-09 00:03:22
81.225.88.26 attack
Brute-force attempt banned
2020-09-09 00:04:55
85.209.0.102 attack
Sep  8 15:36:33 *** sshd[26319]: User root from 85.209.0.102 not allowed because not listed in AllowUsers
2020-09-08 23:38:42
95.243.136.198 attack
$f2bV_matches
2020-09-08 23:34:28
185.108.182.94 attackbotsspam
2020-09-08T08:55:58.526719suse-nuc sshd[23237]: User root from 185.108.182.94 not allowed because listed in DenyUsers
...
2020-09-09 00:02:33
181.48.247.110 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-08 23:25:47
212.83.183.57 attack
$f2bV_matches
2020-09-08 23:23:58
201.231.175.63 attackbotsspam
Sep  8 06:58:33 root sshd[19755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.231.175.63 
...
2020-09-08 23:55:31
190.252.60.111 attack
TCP Port: 25     invalid blocked  Listed on   abuseat-org also barracuda and zen-spamhaus           (209)
2020-09-08 23:31:24
79.138.40.22 attackspambots
SSH_scan
2020-09-08 23:46:57
111.92.73.156 attack
Honeypot attack, port: 445, PTR: 156.73.92.111.asianet.co.in.
2020-09-09 00:09:31
58.222.133.82 attackbotsspam
Sep  7 22:32:11 sigma sshd\[7471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.222.133.82  user=rootSep  7 22:43:10 sigma sshd\[7695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.222.133.82  user=root
...
2020-09-08 23:28:59
222.186.175.212 attack
Sep 8 17:31:16 *host* sshd\[25032\]: Unable to negotiate with 222.186.175.212 port 11986: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\]
2020-09-09 00:09:12

Recently Reported IPs

206.200.143.50 49.53.105.172 133.102.9.80 208.163.131.196
40.86.137.227 159.92.150.240 198.227.6.165 56.17.63.37
148.159.90.233 254.28.74.221 246.24.234.124 117.202.74.203
169.44.132.154 18.242.193.164 85.179.34.169 30.83.31.211
212.109.31.184 121.30.15.143 194.119.3.138 1.97.4.89