Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Rome

Region: Latium

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.45.145.210
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22578
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.45.145.210.			IN	A

;; AUTHORITY SECTION:
.			3007	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071400 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 14 19:53:16 CST 2019
;; MSG SIZE  rcvd: 116
Host info
210.145.45.2.in-addr.arpa domain name pointer net-2-45-145-210.cust.vodafonedsl.it.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
210.145.45.2.in-addr.arpa	name = net-2-45-145-210.cust.vodafonedsl.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.175.93.24 attackbots
 TCP (SYN) 185.175.93.24:46597 -> port 5900, len 40
2020-05-17 08:03:35
103.45.70.63 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 98 - port: 1433 proto: TCP cat: Misc Attack
2020-05-17 08:11:19
51.83.171.20 attackspambots
 TCP (SYN) 51.83.171.20:44652 -> port 18989, len 44
2020-05-17 08:23:49
185.53.88.39 attackspam
Scanned 2 times in the last 24 hours on port 5060
2020-05-17 08:36:12
103.145.13.4 attack
" "
2020-05-17 08:10:07
37.49.226.172 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 5060 proto: TCP cat: Misc Attack
2020-05-17 08:27:41
89.248.168.112 attackbots
 TCP (SYN) 89.248.168.112:48653 -> port 3790, len 44
2020-05-17 08:16:08
64.227.25.158 attack
 TCP (SYN) 64.227.25.158:41533 -> port 4663, len 44
2020-05-17 08:20:08
185.156.73.50 attack
 TCP (SYN) 185.156.73.50:50619 -> port 9999, len 40
2020-05-17 08:35:20
51.83.216.198 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 36 - port: 13390 proto: TCP cat: Misc Attack
2020-05-17 08:23:32
83.97.20.97 attackspambots
" "
2020-05-17 08:16:57
185.175.93.14 attack
 TCP (SYN) 185.175.93.14:52883 -> port 8080, len 40
2020-05-17 08:03:49
89.248.174.193 attack
 TCP (SYN) 89.248.174.193:44126 -> port 49153, len 44
2020-05-17 08:15:09
60.22.72.209 attackspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-05-17 08:21:53
209.141.41.138 attackspambots
Scanned 1 times in the last 24 hours on port 22
2020-05-17 08:30:42

Recently Reported IPs

52.244.196.253 62.109.18.254 50.6.110.68 114.93.248.224
80.122.209.229 192.151.237.162 186.18.247.156 180.126.159.65
97.87.97.242 120.125.244.206 201.42.129.169 113.135.25.63
80.134.16.174 174.117.235.130 62.251.19.56 98.232.181.55
93.208.80.177 178.205.111.5 58.230.83.43 194.44.71.175