Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nerja

Region: Andalusia

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.245.145.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13939
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;185.245.145.119.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 18 15:57:49 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 119.145.245.185.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 119.145.245.185.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
121.28.38.227 attackbots
Icarus honeypot on github
2020-07-01 16:20:25
222.65.245.227 attackspam
firewall-block, port(s): 445/tcp, 1433/tcp
2020-07-01 15:51:24
151.1.138.140 attack
Jun 30 17:54:11 debian-2gb-nbg1-2 kernel: \[15791089.019712\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=151.1.138.140 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=47654 PROTO=TCP SPT=51090 DPT=8539 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-01 16:22:26
138.68.178.64 attackbotsspam
(sshd) Failed SSH login from 138.68.178.64 (GB/United Kingdom/-): 5 in the last 3600 secs
2020-07-01 15:51:41
36.237.9.52 attack
unauthorized connection attempt
2020-07-01 15:50:31
177.126.139.249 attack
Unauthorized connection attempt detected from IP address 177.126.139.249 to port 23
2020-07-01 15:55:08
114.33.159.252 attack
unauthorized connection attempt
2020-07-01 16:28:31
182.61.146.33 attackspam
portscan
2020-07-01 16:04:48
177.126.142.21 attackspam
Unauthorized connection attempt detected from IP address 177.126.142.21 to port 23
2020-07-01 16:05:26
189.1.163.87 attack
Unauthorized connection attempt from IP address 189.1.163.87 on Port 445(SMB)
2020-07-01 16:17:52
106.104.172.173 attackspambots
Honeypot attack, port: 81, PTR: 106-104-172-173.adsl.static.seed.net.tw.
2020-07-01 16:28:49
91.185.237.206 attack
 TCP (SYN) 91.185.237.206:31234 -> port 23, len 44
2020-07-01 16:00:43
82.80.178.178 attackspam
Honeypot attack, port: 81, PTR: bzq-82-80-178-178.red.bezeqint.net.
2020-07-01 16:40:18
119.57.162.18 attackspam
Jun 30 18:57:30 django-0 sshd[22870]: Invalid user student from 119.57.162.18
...
2020-07-01 16:24:37
158.69.226.175 attackspam
portscan
2020-07-01 16:37:51

Recently Reported IPs

7.12.227.182 37.236.6.181 178.176.19.90 206.81.18.60
196.250.57.85 24.17.47.25 114.243.212.250 80.121.120.72
179.125.117.238 140.143.11.169 89.44.178.181 48.60.87.100
87.121.32.203 45.95.33.61 14.98.91.186 187.111.52.66
142.206.26.144 85.95.185.78 148.250.27.224 138.70.163.248