Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: North Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.58.27.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47504
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.58.27.118.			IN	A

;; AUTHORITY SECTION:
.			538	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060401 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 05 06:44:17 CST 2020
;; MSG SIZE  rcvd: 117
Host info
118.27.58.145.in-addr.arpa domain name pointer bonkers.omroep.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
118.27.58.145.in-addr.arpa	name = bonkers.omroep.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.2.72.211 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 24-02-2020 04:55:21.
2020-02-24 14:57:36
171.228.153.167 attackbots
Unauthorized connection attempt detected from IP address 171.228.153.167 to port 445
2020-02-24 14:56:13
222.186.175.150 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Failed password for root from 222.186.175.150 port 22244 ssh2
Failed password for root from 222.186.175.150 port 22244 ssh2
Failed password for root from 222.186.175.150 port 22244 ssh2
Failed password for root from 222.186.175.150 port 22244 ssh2
2020-02-24 15:01:43
178.128.34.14 attackbots
2020-02-24T06:22:09.908771host3.slimhost.com.ua sshd[3738634]: Invalid user www from 178.128.34.14 port 48724
2020-02-24T06:22:09.913753host3.slimhost.com.ua sshd[3738634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.34.14
2020-02-24T06:22:09.908771host3.slimhost.com.ua sshd[3738634]: Invalid user www from 178.128.34.14 port 48724
2020-02-24T06:22:12.045464host3.slimhost.com.ua sshd[3738634]: Failed password for invalid user www from 178.128.34.14 port 48724 ssh2
2020-02-24T06:25:32.261223host3.slimhost.com.ua sshd[3740605]: Invalid user www from 178.128.34.14 port 33563
...
2020-02-24 14:31:05
14.183.169.46 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 24-02-2020 04:55:18.
2020-02-24 15:03:40
180.254.106.69 attackspam
Unauthorized connection attempt detected from IP address 180.254.106.69 to port 445
2020-02-24 14:34:14
61.79.248.232 attackspambots
suspicious action Mon, 24 Feb 2020 01:56:05 -0300
2020-02-24 14:37:53
14.251.170.240 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 24-02-2020 04:55:19.
2020-02-24 15:02:42
220.132.141.138 attack
Automatic report - Port Scan Attack
2020-02-24 14:46:34
132.148.129.180 attackspambots
Invalid user www from 132.148.129.180 port 37252
2020-02-24 15:00:40
2.58.29.29 attack
0,12-01/04 [bc01/m10] PostRequest-Spammer scoring: nairobi
2020-02-24 14:25:15
198.108.67.48 attackbots
TCP port 1337: Scan and connection
2020-02-24 14:43:12
218.92.0.172 attackbotsspam
Feb 24 07:29:49 vpn01 sshd[6551]: Failed password for root from 218.92.0.172 port 55678 ssh2
Feb 24 07:30:00 vpn01 sshd[6551]: Failed password for root from 218.92.0.172 port 55678 ssh2
...
2020-02-24 14:38:21
51.68.230.54 attack
$f2bV_matches
2020-02-24 14:41:00
118.25.75.59 attackspam
ssh brute force
2020-02-24 14:47:28

Recently Reported IPs

110.240.92.129 65.209.155.180 88.23.27.2 89.42.112.206
35.226.15.81 218.10.223.105 129.211.27.191 221.210.103.66
78.68.72.206 213.88.164.112 190.133.214.20 218.94.17.204
45.76.78.48 5.56.157.196 153.142.191.111 92.234.161.15
31.235.96.195 178.195.61.240 73.112.62.165 122.223.109.95