Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Arnhem

Region: Provincie Gelderland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: SURFnet bv

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.74.142.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19604
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.74.142.89.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082100 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 22 00:11:41 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 89.142.74.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 89.142.74.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.142 attackspambots
Jul 18 14:55:35 server sshd[21943]: Failed none for root from 222.186.173.142 port 50022 ssh2
Jul 18 14:55:38 server sshd[21943]: Failed password for root from 222.186.173.142 port 50022 ssh2
Jul 18 14:55:45 server sshd[21943]: Failed password for root from 222.186.173.142 port 50022 ssh2
2020-07-18 21:05:18
192.42.116.13 attackspam
Invalid user admin from 192.42.116.13 port 38198
2020-07-18 21:10:44
152.245.210.219 attackbotsspam
Invalid user ubnt from 152.245.210.219 port 13734
2020-07-18 20:39:18
119.96.94.136 attackspam
Invalid user dxq from 119.96.94.136 port 33370
2020-07-18 20:48:42
85.209.0.102 attackspambots
Invalid user admin from 85.209.0.102 port 60328
2020-07-18 20:55:25
195.70.59.121 attackspam
Jul 18 23:07:48 NG-HHDC-SVS-001 sshd[6572]: Invalid user pn from 195.70.59.121
...
2020-07-18 21:09:42
167.172.38.238 attackspam
Invalid user wn from 167.172.38.238 port 42104
2020-07-18 20:36:23
163.172.66.130 attackbotsspam
Invalid user admin from 163.172.66.130 port 49400
2020-07-18 20:37:27
60.167.177.74 attackspam
Unauthorized SSH login attempts
2020-07-18 21:00:23
61.185.114.130 attackspambots
Invalid user khalid from 61.185.114.130 port 56072
2020-07-18 20:59:29
51.75.30.238 attack
Invalid user ben from 51.75.30.238 port 56738
2020-07-18 21:01:33
80.211.13.167 attackbotsspam
Invalid user wfp from 80.211.13.167 port 50562
2020-07-18 20:56:47
139.99.84.85 attackspam
Invalid user mega from 139.99.84.85 port 56124
2020-07-18 20:43:59
141.98.10.200 attackspambots
Invalid user admin from 141.98.10.200 port 37517
2020-07-18 20:41:14
200.46.28.251 attack
Jul 18 12:48:57 localhost sshd\[16834\]: Invalid user client from 200.46.28.251 port 40014
Jul 18 12:48:57 localhost sshd\[16834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.46.28.251
Jul 18 12:48:59 localhost sshd\[16834\]: Failed password for invalid user client from 200.46.28.251 port 40014 ssh2
...
2020-07-18 21:08:43

Recently Reported IPs

165.194.238.229 76.233.223.179 84.255.112.96 57.13.52.7
188.251.9.136 189.17.247.76 80.25.15.52 188.36.156.14
203.241.254.2 214.172.111.167 129.130.199.201 89.130.158.174
196.184.80.201 14.102.126.65 187.133.138.65 3.134.196.213
109.232.177.235 138.26.18.8 142.136.50.91 191.240.25.81