Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.54.196.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3365
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.54.196.190.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 05:33:09 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 190.196.54.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 190.196.54.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
216.164.139.225 attackbotsspam
Aug 20 14:08:06 ip40 sshd[683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.164.139.225 
Aug 20 14:08:07 ip40 sshd[683]: Failed password for invalid user sabnzbd from 216.164.139.225 port 48868 ssh2
...
2020-08-20 20:46:21
64.225.106.12 attack
Aug 20 14:04:24 * sshd[5802]: Failed password for root from 64.225.106.12 port 33800 ssh2
Aug 20 14:08:09 * sshd[6127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.106.12
2020-08-20 20:45:44
142.93.195.157 attackspam
Aug 20 15:10:55 vps639187 sshd\[26695\]: Invalid user www from 142.93.195.157 port 38360
Aug 20 15:10:55 vps639187 sshd\[26695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.195.157
Aug 20 15:10:57 vps639187 sshd\[26695\]: Failed password for invalid user www from 142.93.195.157 port 38360 ssh2
...
2020-08-20 21:13:27
117.48.227.152 attackspam
2020-08-20T19:03:17.983041billing sshd[30077]: Failed password for invalid user nagios from 117.48.227.152 port 53534 ssh2
2020-08-20T19:07:59.476161billing sshd[8291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.227.152  user=root
2020-08-20T19:08:00.743965billing sshd[8291]: Failed password for root from 117.48.227.152 port 46466 ssh2
...
2020-08-20 20:51:26
118.24.202.34 attack
Aug 20 14:11:59 rocket sshd[22103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.202.34
Aug 20 14:12:02 rocket sshd[22103]: Failed password for invalid user crh from 118.24.202.34 port 37432 ssh2
...
2020-08-20 21:25:37
194.126.40.118 attack
Icarus honeypot on github
2020-08-20 20:48:25
106.12.156.236 attack
Aug 20 14:53:49 eventyay sshd[26562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.156.236
Aug 20 14:53:51 eventyay sshd[26562]: Failed password for invalid user baum from 106.12.156.236 port 35686 ssh2
Aug 20 14:55:00 eventyay sshd[26596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.156.236
...
2020-08-20 21:06:07
201.122.102.21 attackbots
Aug 20 15:04:56 cho sshd[1151815]: Failed password for root from 201.122.102.21 port 42668 ssh2
Aug 20 15:08:36 cho sshd[1152117]: Invalid user test from 201.122.102.21 port 40736
Aug 20 15:08:36 cho sshd[1152117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.122.102.21 
Aug 20 15:08:36 cho sshd[1152117]: Invalid user test from 201.122.102.21 port 40736
Aug 20 15:08:38 cho sshd[1152117]: Failed password for invalid user test from 201.122.102.21 port 40736 ssh2
...
2020-08-20 21:14:12
76.102.119.124 attackbots
Aug 20 12:36:44 localhost sshd[41418]: Invalid user lh from 76.102.119.124 port 51539
Aug 20 12:36:44 localhost sshd[41418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-76-102-119-124.hsd1.ca.comcast.net
Aug 20 12:36:44 localhost sshd[41418]: Invalid user lh from 76.102.119.124 port 51539
Aug 20 12:36:46 localhost sshd[41418]: Failed password for invalid user lh from 76.102.119.124 port 51539 ssh2
Aug 20 12:42:38 localhost sshd[41855]: Invalid user tester from 76.102.119.124 port 56480
...
2020-08-20 20:45:01
188.166.60.138 attackbots
Automatic report - XMLRPC Attack
2020-08-20 21:08:12
216.254.186.76 attack
2020-08-20T14:04:19.086061centos sshd[11020]: Failed password for invalid user kd from 216.254.186.76 port 39896 ssh2
2020-08-20T14:07:28.619385centos sshd[11189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.254.186.76  user=root
2020-08-20T14:07:30.298426centos sshd[11189]: Failed password for root from 216.254.186.76 port 51273 ssh2
...
2020-08-20 21:19:51
91.134.157.246 attackspambots
Aug 20 14:48:03 buvik sshd[22663]: Failed password for invalid user ubuntu from 91.134.157.246 port 15986 ssh2
Aug 20 14:51:49 buvik sshd[23201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.157.246  user=root
Aug 20 14:51:51 buvik sshd[23201]: Failed password for root from 91.134.157.246 port 33364 ssh2
...
2020-08-20 20:52:54
68.183.19.84 attackbots
Aug 20 22:07:56 localhost sshd[1332814]: Invalid user watcher from 68.183.19.84 port 56814
...
2020-08-20 20:54:58
59.104.193.152 attackbots
20/8/20@08:07:52: FAIL: Alarm-Intrusion address from=59.104.193.152
20/8/20@08:07:53: FAIL: Alarm-Intrusion address from=59.104.193.152
...
2020-08-20 21:01:18
122.51.45.200 attack
Aug 20 09:00:10 NPSTNNYC01T sshd[31789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.45.200
Aug 20 09:00:12 NPSTNNYC01T sshd[31789]: Failed password for invalid user prueba from 122.51.45.200 port 58704 ssh2
Aug 20 09:02:32 NPSTNNYC01T sshd[31914]: Failed password for backup from 122.51.45.200 port 54226 ssh2
...
2020-08-20 21:10:27

Recently Reported IPs

94.164.202.138 49.123.172.90 203.123.187.220 164.239.143.222
93.150.101.155 131.237.172.62 175.116.241.29 148.0.7.110
78.110.237.160 250.123.31.100 175.200.66.83 51.60.176.128
34.152.91.87 26.122.181.223 199.152.3.57 23.247.125.237
175.111.61.29 174.162.82.250 122.211.75.32 150.104.11.21