Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.45.23.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25105
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.45.23.119.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:08:19 CST 2025
;; MSG SIZE  rcvd: 106
Host info
119.23.45.194.in-addr.arpa domain name pointer 194-45-23-119.biz.kpn.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
119.23.45.194.in-addr.arpa	name = 194-45-23-119.biz.kpn.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.42.137 attack
Jun  1 14:04:19 scw-6657dc sshd[31229]: Failed password for root from 222.186.42.137 port 37737 ssh2
Jun  1 14:04:19 scw-6657dc sshd[31229]: Failed password for root from 222.186.42.137 port 37737 ssh2
Jun  1 14:04:21 scw-6657dc sshd[31229]: Failed password for root from 222.186.42.137 port 37737 ssh2
...
2020-06-01 22:11:07
177.54.182.227 attack
Automatic report - Port Scan Attack
2020-06-01 22:33:30
159.89.123.66 attackbots
CMS (WordPress or Joomla) login attempt.
2020-06-01 22:29:30
1.52.65.116 attackbots
2020-01-24 16:23:41 1iv0o8-0000nz-UK SMTP connection from \(\[1.52.65.116\]\) \[1.52.65.116\]:16280 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-01-24 16:24:09 1iv0oa-0000q7-JF SMTP connection from \(\[1.52.65.116\]\) \[1.52.65.116\]:46640 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-01-24 16:24:22 1iv0on-0000r8-Cx SMTP connection from \(\[1.52.65.116\]\) \[1.52.65.116\]:26133 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-06-01 22:14:26
177.129.191.142 attackbotsspam
Jun  1 20:55:43 webhost01 sshd[32591]: Failed password for root from 177.129.191.142 port 50890 ssh2
...
2020-06-01 22:09:14
218.92.0.158 attackbots
Jun  1 16:18:01 melroy-server sshd[24016]: Failed password for root from 218.92.0.158 port 37805 ssh2
Jun  1 16:18:06 melroy-server sshd[24016]: Failed password for root from 218.92.0.158 port 37805 ssh2
...
2020-06-01 22:30:22
82.65.27.68 attackbots
Jun  1 14:00:37 vps687878 sshd\[15951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.65.27.68  user=root
Jun  1 14:00:39 vps687878 sshd\[15951\]: Failed password for root from 82.65.27.68 port 40106 ssh2
Jun  1 14:04:07 vps687878 sshd\[16149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.65.27.68  user=root
Jun  1 14:04:08 vps687878 sshd\[16149\]: Failed password for root from 82.65.27.68 port 44342 ssh2
Jun  1 14:07:25 vps687878 sshd\[16619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.65.27.68  user=root
...
2020-06-01 22:16:09
14.143.107.226 attack
2020-06-01 12:38:55,120 fail2ban.actions        [937]: NOTICE  [sshd] Ban 14.143.107.226
2020-06-01 13:13:26,455 fail2ban.actions        [937]: NOTICE  [sshd] Ban 14.143.107.226
2020-06-01 13:48:44,765 fail2ban.actions        [937]: NOTICE  [sshd] Ban 14.143.107.226
2020-06-01 14:24:22,197 fail2ban.actions        [937]: NOTICE  [sshd] Ban 14.143.107.226
2020-06-01 15:02:24,025 fail2ban.actions        [937]: NOTICE  [sshd] Ban 14.143.107.226
...
2020-06-01 22:06:43
223.220.251.232 attack
Jun  1 13:41:15 ns382633 sshd\[30924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.220.251.232  user=root
Jun  1 13:41:17 ns382633 sshd\[30924\]: Failed password for root from 223.220.251.232 port 42117 ssh2
Jun  1 14:03:55 ns382633 sshd\[2058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.220.251.232  user=root
Jun  1 14:03:57 ns382633 sshd\[2058\]: Failed password for root from 223.220.251.232 port 35031 ssh2
Jun  1 14:07:40 ns382633 sshd\[2850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.220.251.232  user=root
2020-06-01 22:42:14
104.48.40.165 attackbots
2020-06-01T12:10:37.414838Z 1275669e72f9 New connection: 104.48.40.165:35172 (172.17.0.3:2222) [session: 1275669e72f9]
2020-06-01T12:24:23.909391Z 4cedf442d232 New connection: 104.48.40.165:57450 (172.17.0.3:2222) [session: 4cedf442d232]
2020-06-01 22:11:37
104.248.130.10 attackbots
Jun  1 02:21:22 serwer sshd\[31429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10  user=root
Jun  1 02:21:24 serwer sshd\[31429\]: Failed password for root from 104.248.130.10 port 33008 ssh2
Jun  1 02:24:32 serwer sshd\[31723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10  user=root
Jun  1 02:24:34 serwer sshd\[31723\]: Failed password for root from 104.248.130.10 port 37110 ssh2
Jun  1 02:27:34 serwer sshd\[32085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10  user=root
Jun  1 02:27:36 serwer sshd\[32085\]: Failed password for root from 104.248.130.10 port 41212 ssh2
Jun  1 02:30:42 serwer sshd\[32499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10  user=root
Jun  1 02:30:44 serwer sshd\[32499\]: Failed password for root from 104.248.130.10 
...
2020-06-01 22:04:05
1.52.96.55 attack
2019-07-07 16:44:09 1hk8Oe-0002kF-JH SMTP connection from \(\[1.52.96.55\]\) \[1.52.96.55\]:25980 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-07 16:44:19 1hk8Oo-0002kQ-BY SMTP connection from \(\[1.52.96.55\]\) \[1.52.96.55\]:54324 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-07 16:44:28 1hk8Ox-0002kc-Fk SMTP connection from \(\[1.52.96.55\]\) \[1.52.96.55\]:53012 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-06-01 22:07:08
1.52.102.145 attackbotsspam
2019-11-24 14:15:13 1iYrjM-0002QG-00 SMTP connection from \(\[1.52.102.145\]\) \[1.52.102.145\]:19177 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-11-24 14:15:28 1iYrjb-0002QU-FX SMTP connection from \(\[1.52.102.145\]\) \[1.52.102.145\]:11129 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-11-24 14:15:36 1iYrjj-0002Qg-63 SMTP connection from \(\[1.52.102.145\]\) \[1.52.102.145\]:49583 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-06-01 22:32:35
62.4.52.44 attackspam
Port probing on unauthorized port 445
2020-06-01 22:08:43
213.60.19.18 attackbots
Jun  1 14:05:13 vmd26974 sshd[1276]: Failed password for root from 213.60.19.18 port 35994 ssh2
...
2020-06-01 22:12:47

Recently Reported IPs

195.11.244.50 188.94.168.64 49.135.208.172 137.133.121.237
214.172.42.115 185.66.26.89 47.155.215.229 172.205.95.209
49.204.70.169 139.170.182.44 64.19.102.43 188.7.241.87
191.239.232.166 85.65.132.201 96.173.37.251 250.130.56.205
199.54.159.29 234.34.125.115 20.220.108.200 250.136.10.188