Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Eindhoven

Region: North Brabant

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.85.241.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34062
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.85.241.57.			IN	A

;; AUTHORITY SECTION:
.			512	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100100 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 01 09:38:58 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 57.241.85.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 57.241.85.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.77.105.100 attackspam
Apr 13 13:53:04 mail sshd[9804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.105.100  user=root
Apr 13 13:53:06 mail sshd[9804]: Failed password for root from 202.77.105.100 port 35110 ssh2
Apr 13 14:02:04 mail sshd[24013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.105.100  user=root
Apr 13 14:02:06 mail sshd[24013]: Failed password for root from 202.77.105.100 port 38700 ssh2
Apr 13 14:10:55 mail sshd[5437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.105.100  user=root
Apr 13 14:10:57 mail sshd[5437]: Failed password for root from 202.77.105.100 port 42270 ssh2
...
2020-04-13 20:55:20
141.98.81.81 attackbotsspam
Invalid user 1234 from 141.98.81.81 port 39456
2020-04-13 20:40:42
180.183.68.155 attackspambots
1586767382 - 04/13/2020 10:43:02 Host: 180.183.68.155/180.183.68.155 Port: 445 TCP Blocked
2020-04-13 20:33:53
134.209.147.198 attackbots
Apr 13 10:57:22 web8 sshd\[9107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.147.198  user=root
Apr 13 10:57:24 web8 sshd\[9107\]: Failed password for root from 134.209.147.198 port 50682 ssh2
Apr 13 11:01:58 web8 sshd\[11601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.147.198  user=root
Apr 13 11:02:00 web8 sshd\[11601\]: Failed password for root from 134.209.147.198 port 59032 ssh2
Apr 13 11:06:28 web8 sshd\[13988\]: Invalid user vrich from 134.209.147.198
2020-04-13 20:55:49
27.50.131.196 attack
Apr 13 18:20:28 our-server-hostname postfix/smtpd[29450]: connect from unknown[27.50.131.196]
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=27.50.131.196
2020-04-13 20:59:40
112.163.230.185 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-13 21:00:32
101.251.242.141 attackspambots
Apr 13 05:16:14 mockhub sshd[28417]: Failed password for root from 101.251.242.141 port 36804 ssh2
...
2020-04-13 20:29:55
43.241.146.110 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-13 20:28:14
120.29.158.173 attackspambots
Apr 13 09:43:22 ip-172-31-62-245 sshd\[23324\]: Failed password for root from 120.29.158.173 port 51920 ssh2\
Apr 13 09:47:35 ip-172-31-62-245 sshd\[23359\]: Invalid user jjj from 120.29.158.173\
Apr 13 09:47:37 ip-172-31-62-245 sshd\[23359\]: Failed password for invalid user jjj from 120.29.158.173 port 59864 ssh2\
Apr 13 09:51:55 ip-172-31-62-245 sshd\[23409\]: Invalid user leslie from 120.29.158.173\
Apr 13 09:51:57 ip-172-31-62-245 sshd\[23409\]: Failed password for invalid user leslie from 120.29.158.173 port 39566 ssh2\
2020-04-13 20:28:52
83.97.20.33 attackbots
Unauthorized connection attempt detected from IP address 83.97.20.33 to port 22
2020-04-13 20:30:25
51.255.170.237 attackspam
51.255.170.237 - - [13/Apr/2020:12:43:03 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-04-13 20:30:43
141.98.81.83 attackbotsspam
$f2bV_matches
2020-04-13 20:35:59
47.220.235.64 attackspam
SSH Brute-Force reported by Fail2Ban
2020-04-13 20:34:44
141.98.81.99 attackspam
Apr 13 14:52:38 meumeu sshd[27385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.99 
Apr 13 14:52:40 meumeu sshd[27385]: Failed password for invalid user Administrator from 141.98.81.99 port 34053 ssh2
Apr 13 14:53:05 meumeu sshd[27466]: Failed password for root from 141.98.81.99 port 41071 ssh2
...
2020-04-13 20:54:00
121.158.202.216 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-13 21:13:43

Recently Reported IPs

12.104.107.140 92.198.232.150 53.246.25.224 137.198.88.108
145.203.111.97 186.14.113.95 193.94.90.42 194.110.140.39
170.254.121.72 117.165.79.155 24.211.204.13 169.206.47.157
54.38.22.58 55.167.22.4 189.250.202.166 46.3.3.225
185.70.10.224 72.123.169.168 79.122.238.98 150.164.178.215