Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.98.42.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.98.42.107.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 01:18:52 CST 2025
;; MSG SIZE  rcvd: 106
Host info
107.42.98.145.in-addr.arpa domain name pointer SURFnet-CIDR-Block-98-145.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
107.42.98.145.in-addr.arpa	name = SURFnet-CIDR-Block-98-145.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.231.6.127 attackbotsspam
Telnet Server BruteForce Attack
2019-11-24 09:19:07
61.155.59.57 attackspam
Nov 23 23:42:24 MK-Soft-VM6 sshd[18615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.155.59.57 
Nov 23 23:42:27 MK-Soft-VM6 sshd[18615]: Failed password for invalid user admin from 61.155.59.57 port 41725 ssh2
...
2019-11-24 09:40:09
5.239.244.236 attackspambots
Nov 24 01:55:54 eventyay sshd[11516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.239.244.236
Nov 24 01:55:57 eventyay sshd[11516]: Failed password for invalid user react from 5.239.244.236 port 58660 ssh2
Nov 24 02:02:36 eventyay sshd[11762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.239.244.236
...
2019-11-24 09:17:14
106.12.73.236 attack
2019-11-24T01:30:47.783888abusebot-2.cloudsearch.cf sshd\[14784\]: Invalid user tharan from 106.12.73.236 port 41678
2019-11-24 09:44:46
106.46.160.122 attack
badbot
2019-11-24 09:14:39
83.97.20.49 attackspam
port scan and connect, tcp 25 (smtp)
2019-11-24 09:14:51
185.216.140.252 attackbots
11/23/2019-20:25:42.165989 185.216.140.252 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-24 09:34:00
150.223.10.13 attackbotsspam
2019-11-24T01:21:15.705163abusebot-6.cloudsearch.cf sshd\[14515\]: Invalid user apache from 150.223.10.13 port 39230
2019-11-24 09:35:12
201.249.59.205 attackbots
2019-11-24T01:08:50.472502abusebot-6.cloudsearch.cf sshd\[14459\]: Invalid user ellacoya from 201.249.59.205 port 46574
2019-11-24 09:39:31
2604:a880:800:c1::16c:b001 attackbots
xmlrpc attack
2019-11-24 09:41:18
81.174.8.105 attack
SSH brutforce
2019-11-24 09:30:20
185.176.27.42 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-24 09:36:12
113.117.109.217 attackbotsspam
badbot
2019-11-24 09:37:02
153.99.5.225 attackbots
badbot
2019-11-24 09:07:28
200.0.236.210 attackspambots
Nov 24 02:17:17 localhost sshd\[1703\]: Invalid user ayaser from 200.0.236.210 port 38084
Nov 24 02:17:17 localhost sshd\[1703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.0.236.210
Nov 24 02:17:19 localhost sshd\[1703\]: Failed password for invalid user ayaser from 200.0.236.210 port 38084 ssh2
2019-11-24 09:24:27

Recently Reported IPs

125.78.5.94 197.234.153.157 140.47.111.98 142.190.72.103
174.249.9.216 190.220.74.49 44.20.100.219 162.178.86.3
4.157.125.206 14.105.226.120 157.133.85.91 125.51.86.163
141.55.20.42 65.91.148.98 127.61.165.67 135.56.0.16
140.162.221.136 8.199.170.250 84.27.56.166 147.59.168.12