Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: North Holland

Country: Netherlands

Internet Service Provider: KPN

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
145.53.204.47 attackbots
TCP Port Scanning
2019-11-05 17:50:44
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.53.204.32
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54814
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.53.204.32.			IN	A

;; AUTHORITY SECTION:
.			357	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020012201 1800 900 604800 86400

;; Query time: 121 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 04:56:21 CST 2020
;; MSG SIZE  rcvd: 117
Host info
32.204.53.145.in-addr.arpa domain name pointer ip9135cc20.speed.planet.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
32.204.53.145.in-addr.arpa	name = ip9135cc20.speed.planet.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.30.112 attackspam
Jun  8 06:26:07 abendstille sshd\[15096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
Jun  8 06:26:09 abendstille sshd\[15096\]: Failed password for root from 222.186.30.112 port 64340 ssh2
Jun  8 06:26:12 abendstille sshd\[15096\]: Failed password for root from 222.186.30.112 port 64340 ssh2
Jun  8 06:26:14 abendstille sshd\[15096\]: Failed password for root from 222.186.30.112 port 64340 ssh2
Jun  8 06:26:16 abendstille sshd\[15327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
...
2020-06-08 12:27:30
144.91.78.125 attackspam
1433/tcp
[2020-06-08]1pkt
2020-06-08 12:20:30
149.202.133.43 attack
Jun  8 05:51:07 haigwepa sshd[8038]: Failed password for root from 149.202.133.43 port 51410 ssh2
...
2020-06-08 12:32:49
113.174.56.196 attack
8080/tcp
[2020-06-08]1pkt
2020-06-08 12:09:57
196.219.94.57 attack
445/tcp 445/tcp
[2020-06-08]2pkt
2020-06-08 12:18:47
27.73.157.13 attackspam
60001/tcp
[2020-06-08]1pkt
2020-06-08 12:23:08
69.7.188.84 attackbotsspam
SSH invalid-user multiple login try
2020-06-08 12:41:50
209.145.87.247 attack
port scan and connect, tcp 23 (telnet)
2020-06-08 12:14:00
182.61.12.12 attackspam
Jun  8 05:51:53 OPSO sshd\[18013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.12.12  user=root
Jun  8 05:51:55 OPSO sshd\[18013\]: Failed password for root from 182.61.12.12 port 46180 ssh2
Jun  8 05:53:35 OPSO sshd\[18157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.12.12  user=root
Jun  8 05:53:38 OPSO sshd\[18157\]: Failed password for root from 182.61.12.12 port 39594 ssh2
Jun  8 05:55:16 OPSO sshd\[18745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.12.12  user=root
2020-06-08 12:19:46
113.186.14.54 attackspam
445/tcp
[2020-06-08]1pkt
2020-06-08 12:31:36
47.90.201.205 attack
*Port Scan* detected from 47.90.201.205 (US/United States/Virginia/Ashburn/-). 4 hits in the last 225 seconds
2020-06-08 12:36:07
77.48.200.89 attack
2020-06-08 12:15:44
178.216.25.60 attackbotsspam
2020-06-08 12:20:12
148.70.154.10 attackspambots
Jun  8 06:08:24 piServer sshd[7013]: Failed password for root from 148.70.154.10 port 60268 ssh2
Jun  8 06:12:31 piServer sshd[7498]: Failed password for root from 148.70.154.10 port 34264 ssh2
...
2020-06-08 12:21:42
94.156.4.113 attackspambots
81/tcp
[2020-06-08]1pkt
2020-06-08 12:13:33

Recently Reported IPs

68.66.69.20 113.81.190.106 32.90.15.80 151.245.85.150
74.94.238.191 220.154.16.119 82.142.168.205 111.90.142.20
121.73.23.143 63.94.44.184 78.229.124.161 67.244.72.48
118.122.122.166 80.61.4.121 162.171.147.140 126.252.149.215
196.228.127.167 69.146.40.58 3.87.191.167 175.205.166.33