Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Rickling

Region: Schleswig-Holstein

Country: Germany

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.200.229.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38945
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.200.229.145.			IN	A

;; AUTHORITY SECTION:
.			305	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022200 1800 900 604800 86400

;; Query time: 162 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 05:47:57 CST 2020
;; MSG SIZE  rcvd: 117
Host info
145.229.200.2.in-addr.arpa domain name pointer dslb-002-200-229-145.002.200.pools.vodafone-ip.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.229.200.2.in-addr.arpa	name = dslb-002-200-229-145.002.200.pools.vodafone-ip.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.34.72.226 attackspambots
Port 1433 Scan
2020-01-04 03:13:18
213.75.3.49 attackbotsspam
SpamReport
2020-01-04 03:27:30
42.114.234.186 attackbotsspam
Unauthorized connection attempt from IP address 42.114.234.186 on Port 445(SMB)
2020-01-04 03:14:04
209.17.96.130 attackbots
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-01-04 03:30:26
80.211.254.244 attackbotsspam
" "
2020-01-04 02:59:24
50.116.35.225 attack
firewall-block, port(s): 161/udp
2020-01-04 03:32:04
185.175.93.104 attack
01/03/2020-13:44:04.585176 185.175.93.104 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-04 03:00:01
200.54.126.240 attackspambots
Unauthorized connection attempt detected from IP address 200.54.126.240 to port 445
2020-01-04 03:16:18
49.149.111.65 attack
Unauthorized connection attempt from IP address 49.149.111.65 on Port 445(SMB)
2020-01-04 03:06:16
103.31.120.3 attack
Unauthorized connection attempt from IP address 103.31.120.3 on Port 445(SMB)
2020-01-04 03:09:23
82.64.15.106 attack
Jan  3 18:34:20 Ubuntu-1404-trusty-64-minimal sshd\[9153\]: Invalid user pi from 82.64.15.106
Jan  3 18:34:20 Ubuntu-1404-trusty-64-minimal sshd\[9155\]: Invalid user pi from 82.64.15.106
Jan  3 18:34:21 Ubuntu-1404-trusty-64-minimal sshd\[9153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.15.106
Jan  3 18:34:21 Ubuntu-1404-trusty-64-minimal sshd\[9155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.15.106
Jan  3 18:34:22 Ubuntu-1404-trusty-64-minimal sshd\[9153\]: Failed password for invalid user pi from 82.64.15.106 port 39868 ssh2
Jan  3 18:34:22 Ubuntu-1404-trusty-64-minimal sshd\[9155\]: Failed password for invalid user pi from 82.64.15.106 port 39874 ssh2
2020-01-04 02:58:10
113.188.239.79 attackspambots
1578056443 - 01/03/2020 14:00:43 Host: 113.188.239.79/113.188.239.79 Port: 445 TCP Blocked
2020-01-04 03:04:56
104.219.41.62 attackbotsspam
wordpress attempted hack
2020-01-04 03:15:52
180.124.183.246 attackbotsspam
IP: 180.124.183.246
Ports affected
    Simple Mail Transfer (25) 
Found in DNSBL('s)
ASN Details
   AS4134 No.31 Jin-rong Street
   China (CN)
   CIDR 180.124.0.0/16
Log Date: 3/01/2020 12:31:50 PM UTC
2020-01-04 03:33:32
185.156.73.52 attackspambots
01/03/2020-14:05:55.541608 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-04 03:33:03

Recently Reported IPs

218.12.224.90 147.147.38.47 14.171.130.226 3.13.27.223
58.17.128.82 50.245.46.226 198.37.196.191 148.3.213.7
105.131.121.230 91.215.68.46 121.127.210.93 35.188.28.129
84.44.217.134 219.209.66.81 75.15.249.204 159.0.111.71
189.179.157.241 129.71.246.239 207.255.133.250 182.155.182.250