Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.77.103.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26987
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.77.103.219.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:21:24 CST 2022
;; MSG SIZE  rcvd: 107
Host info
219.103.77.145.in-addr.arpa domain name pointer pdok.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
219.103.77.145.in-addr.arpa	name = pdok.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.235.176.145 attackbots
Invalid user admin from 41.235.176.145 port 44636
2019-10-11 21:52:33
54.37.205.162 attack
Oct 11 15:05:17 MK-Soft-Root2 sshd[29104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.205.162 
Oct 11 15:05:19 MK-Soft-Root2 sshd[29104]: Failed password for invalid user qhsupport from 54.37.205.162 port 41744 ssh2
...
2019-10-11 21:24:08
5.196.201.7 attack
Oct 11 15:14:01 mail postfix/smtpd[28959]: warning: unknown[5.196.201.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 11 15:14:37 mail postfix/smtpd[3363]: warning: unknown[5.196.201.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 11 15:18:09 mail postfix/smtpd[3404]: warning: unknown[5.196.201.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-11 21:56:16
213.162.94.10 attack
Invalid user xbian from 213.162.94.10 port 36778
2019-10-11 21:31:38
49.48.14.238 attackspam
Invalid user admin from 49.48.14.238 port 50396
2019-10-11 21:50:10
208.102.113.11 attackspambots
Invalid user administrator from 208.102.113.11 port 47272
2019-10-11 21:57:24
92.130.58.249 attack
Oct 11 17:01:04 gw1 sshd[27387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.130.58.249
...
2019-10-11 21:20:18
218.255.150.226 attackbotsspam
Invalid user t7inst from 218.255.150.226 port 44064
2019-10-11 21:30:46
123.18.201.159 attack
Invalid user admin from 123.18.201.159 port 51843
2019-10-11 22:06:31
156.202.209.210 attackbots
Invalid user admin from 156.202.209.210 port 47832
2019-10-11 22:03:20
209.212.218.52 attack
Invalid user admin from 209.212.218.52 port 52471
2019-10-11 21:32:50
14.226.86.12 attackbotsspam
Invalid user support from 14.226.86.12 port 33872
2019-10-11 21:55:19
51.75.248.251 attack
10/11/2019-09:23:44.408376 51.75.248.251 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-11 21:24:35
177.93.67.226 attack
Invalid user admin from 177.93.67.226 port 49571
2019-10-11 22:00:38
78.73.21.231 attack
Invalid user pi from 78.73.21.231 port 60990
2019-10-11 21:22:10

Recently Reported IPs

145.82.53.232 145.82.144.94 145.64.132.101 145.40.68.221
145.79.201.230 145.40.68.219 145.82.16.7 145.82.136.254
145.77.108.15 145.4.230.12 145.80.222.13 242.239.18.132
145.82.62.218 145.85.4.20 145.88.214.205 145.97.18.49
145.97.33.92 145.97.36.163 145.97.36.172 145.97.35.130