Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.194.136.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49039
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.194.136.145.		IN	A

;; AUTHORITY SECTION:
.			383	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023011900 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 19 23:25:05 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 145.136.194.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.136.194.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
198.12.225.100 attackspam
198.12.225.100 - - [14/Aug/2020:08:07:16 +0100] "POST /wp-login.php HTTP/1.1" 200 1968 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.12.225.100 - - [14/Aug/2020:08:07:18 +0100] "POST /wp-login.php HTTP/1.1" 200 1952 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.12.225.100 - - [14/Aug/2020:08:07:18 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-14 15:23:51
118.193.32.219 attack
Aug 13 23:50:31 mockhub sshd[12661]: Failed password for root from 118.193.32.219 port 56458 ssh2
...
2020-08-14 15:52:08
58.69.139.71 attackbots
Fail2Ban Ban Triggered
2020-08-14 16:04:01
45.4.5.221 attackspam
Triggered by Fail2Ban at Ares web server
2020-08-14 15:23:25
151.80.173.36 attackbotsspam
Aug 13 21:48:58 web9 sshd\[8568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.173.36  user=root
Aug 13 21:48:59 web9 sshd\[8568\]: Failed password for root from 151.80.173.36 port 60748 ssh2
Aug 13 21:52:55 web9 sshd\[9007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.173.36  user=root
Aug 13 21:52:57 web9 sshd\[9007\]: Failed password for root from 151.80.173.36 port 37218 ssh2
Aug 13 21:57:07 web9 sshd\[9605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.173.36  user=root
2020-08-14 16:00:18
209.159.212.65 attackspam
Brute forcing email accounts
2020-08-14 15:48:18
37.205.51.40 attack
2020-08-14T08:35:17.686090vps751288.ovh.net sshd\[25504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-37-205-51-40.bbcustomer.zsttk.net  user=root
2020-08-14T08:35:19.234703vps751288.ovh.net sshd\[25504\]: Failed password for root from 37.205.51.40 port 51376 ssh2
2020-08-14T08:39:43.878262vps751288.ovh.net sshd\[25538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-37-205-51-40.bbcustomer.zsttk.net  user=root
2020-08-14T08:39:45.941469vps751288.ovh.net sshd\[25538\]: Failed password for root from 37.205.51.40 port 34252 ssh2
2020-08-14T08:44:01.339223vps751288.ovh.net sshd\[25564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-37-205-51-40.bbcustomer.zsttk.net  user=root
2020-08-14 15:30:28
221.208.253.253 attack
IMAP
2020-08-14 15:44:52
114.236.205.52 attackbots
20 attempts against mh-ssh on frost
2020-08-14 15:51:09
51.68.11.215 attackspam
Automatic report - Banned IP Access
2020-08-14 15:39:46
61.183.139.131 attackbotsspam
Aug 14 07:46:38 journals sshd\[59894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.183.139.131  user=root
Aug 14 07:46:40 journals sshd\[59894\]: Failed password for root from 61.183.139.131 port 58586 ssh2
Aug 14 07:49:55 journals sshd\[60235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.183.139.131  user=root
Aug 14 07:49:57 journals sshd\[60235\]: Failed password for root from 61.183.139.131 port 38694 ssh2
Aug 14 07:53:37 journals sshd\[60746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.183.139.131  user=root
...
2020-08-14 16:05:25
80.191.192.112 attackbots
port 23
2020-08-14 15:53:15
36.92.208.39 attackbotsspam
20/8/13@23:37:34: FAIL: Alarm-Network address from=36.92.208.39
...
2020-08-14 16:02:41
187.111.8.82 attackbotsspam
bruteforce detected
2020-08-14 15:33:39
139.59.129.45 attackbotsspam
Aug 14 08:35:37 vmd17057 sshd[25401]: Failed password for root from 139.59.129.45 port 45868 ssh2
...
2020-08-14 15:29:31

Recently Reported IPs

96.65.64.17 162.144.63.125 164.68.127.143 24.52.1.127
213.193.177.68 157.41.218.104 85.12.204.53 76.235.244.243
111.90.105.165 236.55.137.1 168.119.221.69 107.43.74.219
187.190.242.95 73.33.162.136 206.189.88.212 206.189.88.105
206.189.88.189 1.27.66.71 246.11.37.245 8.9.230.113