Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.69.74.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3965
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.69.74.135.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:55:41 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 135.74.69.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 135.74.69.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.191.209.153 attackspambots
Jul 31 15:38:49 auth: Info: passwd-file(fw1@hosting.usmancity.ru,91.191.209.153): unknown user
...
2020-07-31 20:44:19
1.2.198.231 attack
Unauthorized connection attempt from IP address 1.2.198.231 on Port 445(SMB)
2020-07-31 20:11:11
166.175.63.185 attackbotsspam
Brute forcing email accounts
2020-07-31 20:32:02
5.135.153.154 attack
Fail2Ban Ban Triggered
2020-07-31 20:42:43
221.195.189.154 attackbots
$f2bV_matches
2020-07-31 20:17:00
112.85.42.104 attackspam
Jul 31 14:38:51 host sshd[26411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.104  user=root
Jul 31 14:38:53 host sshd[26411]: Failed password for root from 112.85.42.104 port 35927 ssh2
...
2020-07-31 20:41:12
194.61.55.107 attackspambots
RDP Bruteforce
2020-07-31 20:42:00
192.99.2.41 attack
Jul 31 14:19:42 fhem-rasp sshd[32324]: Failed password for root from 192.99.2.41 port 53976 ssh2
Jul 31 14:19:44 fhem-rasp sshd[32324]: Disconnected from authenticating user root 192.99.2.41 port 53976 [preauth]
...
2020-07-31 20:24:34
103.87.214.100 attack
Invalid user tomato from 103.87.214.100 port 34006
2020-07-31 20:10:09
103.236.253.28 attackspam
Invalid user 22 from 103.236.253.28 port 49586
2020-07-31 20:09:50
123.31.27.102 attackspambots
Jul 31 14:02:54 eventyay sshd[3461]: Failed password for root from 123.31.27.102 port 49086 ssh2
Jul 31 14:07:48 eventyay sshd[3557]: Failed password for root from 123.31.27.102 port 32864 ssh2
...
2020-07-31 20:25:40
222.186.31.83 attackspambots
$f2bV_matches
2020-07-31 20:48:01
54.38.187.5 attackspambots
Jul 31 14:22:34 abendstille sshd\[18763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.187.5  user=root
Jul 31 14:22:36 abendstille sshd\[18763\]: Failed password for root from 54.38.187.5 port 54976 ssh2
Jul 31 14:24:52 abendstille sshd\[21128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.187.5  user=root
Jul 31 14:24:54 abendstille sshd\[21128\]: Failed password for root from 54.38.187.5 port 34608 ssh2
Jul 31 14:27:09 abendstille sshd\[23285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.187.5  user=root
...
2020-07-31 20:32:14
222.86.158.232 attackbotsspam
Invalid user wangdonghui from 222.86.158.232 port 33606
2020-07-31 20:09:20
197.47.213.93 attack
Unauthorized connection attempt from IP address 197.47.213.93 on Port 445(SMB)
2020-07-31 20:11:42

Recently Reported IPs

173.179.22.219 247.114.63.50 50.152.220.145 230.3.110.253
170.169.120.79 98.36.138.113 208.215.115.247 144.81.126.165
179.170.41.224 255.97.237.40 133.29.5.149 73.145.92.17
91.18.196.170 49.42.211.179 194.122.126.55 149.47.106.35
179.134.28.93 44.220.114.20 197.227.203.169 198.74.197.210