Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.96.155.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28355
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.96.155.148.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 06:33:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
148.155.96.145.in-addr.arpa domain name pointer host-148-155.eduroamers.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.155.96.145.in-addr.arpa	name = host-148-155.eduroamers.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.162.51.160 attackbotsspam
1577201374 - 12/24/2019 16:29:34 Host: 188.162.51.160/188.162.51.160 Port: 445 TCP Blocked
2019-12-25 05:12:30
79.166.215.231 attack
Telnet Server BruteForce Attack
2019-12-25 05:40:46
218.16.218.109 attack
" "
2019-12-25 05:35:01
5.89.64.166 attack
no
2019-12-25 05:38:31
113.161.149.47 attack
Invalid user negretta from 113.161.149.47 port 59846
2019-12-25 05:21:38
189.240.117.236 attackspambots
Fail2Ban Ban Triggered
2019-12-25 05:25:54
187.189.63.82 attackspambots
Dec 24 21:29:46 localhost sshd\[4994\]: Invalid user www from 187.189.63.82 port 49622
Dec 24 21:29:46 localhost sshd\[4994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.63.82
Dec 24 21:29:47 localhost sshd\[4994\]: Failed password for invalid user www from 187.189.63.82 port 49622 ssh2
2019-12-25 05:11:48
221.166.246.14 attackspam
Automatic report - SSH Brute-Force Attack
2019-12-25 05:41:59
13.71.22.47 attack
firewall-block, port(s): 55551/tcp
2019-12-25 05:34:16
45.125.66.138 attackspambots
2019-12-24 dovecot_login authenticator failed for \(User\) \[45.125.66.138\]: 535 Incorrect authentication data \(set_id=alpina\)
2019-12-24 dovecot_login authenticator failed for \(User\) \[45.125.66.138\]: 535 Incorrect authentication data \(set_id=mirage\)
2019-12-24 dovecot_login authenticator failed for \(User\) \[45.125.66.138\]: 535 Incorrect authentication data \(set_id=eagle2\)
2019-12-25 05:19:06
37.24.8.99 attackspam
ssh failed login
2019-12-25 05:25:33
79.166.84.12 attack
Telnet Server BruteForce Attack
2019-12-25 05:39:33
178.238.236.128 attackbots
firewall-block, port(s): 5984/tcp
2019-12-25 05:31:17
86.243.205.194 attackspambots
Automatic report - Port Scan
2019-12-25 05:27:43
222.186.175.140 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140  user=root
Failed password for root from 222.186.175.140 port 62618 ssh2
Failed password for root from 222.186.175.140 port 62618 ssh2
Failed password for root from 222.186.175.140 port 62618 ssh2
Failed password for root from 222.186.175.140 port 62618 ssh2
2019-12-25 05:18:26

Recently Reported IPs

14.55.6.231 2.187.190.4 19.52.147.190 236.93.165.22
25.184.33.179 148.133.25.78 203.251.39.162 198.220.31.126
239.203.32.121 236.13.153.144 224.89.103.46 146.175.124.104
224.171.129.24 68.47.109.203 163.71.79.114 4.116.159.211
196.115.114.199 73.194.105.184 207.34.193.67 86.185.117.68