Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Langenthal

Region: Bern

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: Quickline AG

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.145.13.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64596
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.145.13.145.			IN	A

;; AUTHORITY SECTION:
.			340	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062901 1800 900 604800 86400

;; Query time: 1143 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 30 03:01:21 CST 2019
;; MSG SIZE  rcvd: 116

Host info
145.13.145.5.in-addr.arpa has no PTR record
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
145.13.145.5.in-addr.arpa	name = 145-13-145-5.dyn.cable.fcom.ch.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
83.239.6.214 attackbotsspam
Unauthorized connection attempt from IP address 83.239.6.214 on Port 445(SMB)
2020-04-20 05:34:48
78.186.1.124 attackbotsspam
Unauthorized connection attempt from IP address 78.186.1.124 on Port 445(SMB)
2020-04-20 05:13:55
106.75.13.213 attack
5x Failed Password
2020-04-20 05:23:03
61.19.27.253 attack
Apr 19 22:15:14 vmd17057 sshd[19984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.19.27.253 
Apr 19 22:15:17 vmd17057 sshd[19984]: Failed password for invalid user admin from 61.19.27.253 port 52990 ssh2
...
2020-04-20 05:28:44
142.93.109.153 attackspambots
Automatic report - Port Scan
2020-04-20 05:35:43
218.78.101.32 attack
20 attempts against mh-ssh on water
2020-04-20 05:31:20
84.3.176.12 attackspambots
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-04-20 05:34:08
148.70.136.94 attackbots
SSH invalid-user multiple login attempts
2020-04-20 05:30:08
54.93.104.49 attackbotsspam
Apr 20 01:51:34 gw1 sshd[30363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.93.104.49
Apr 20 01:51:36 gw1 sshd[30363]: Failed password for invalid user ftpuser from 54.93.104.49 port 51671 ssh2
...
2020-04-20 05:35:00
13.75.46.224 attack
SSH Brute-Force Attack
2020-04-20 05:11:19
185.176.27.34 attack
Fail2Ban Ban Triggered
2020-04-20 05:26:33
103.39.213.133 attackbotsspam
Apr 19 23:03:52 haigwepa sshd[28179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.39.213.133 
Apr 19 23:03:53 haigwepa sshd[28179]: Failed password for invalid user pk from 103.39.213.133 port 38696 ssh2
...
2020-04-20 05:17:36
59.10.5.156 attackspam
Apr 19 22:28:20 vpn01 sshd[6920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.10.5.156
Apr 19 22:28:22 vpn01 sshd[6920]: Failed password for invalid user uo from 59.10.5.156 port 44950 ssh2
...
2020-04-20 05:34:20
138.197.151.213 attackspambots
Apr 19 22:58:20 legacy sshd[20752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.151.213
Apr 19 22:58:22 legacy sshd[20752]: Failed password for invalid user kg from 138.197.151.213 port 57600 ssh2
Apr 19 23:02:19 legacy sshd[21110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.151.213
...
2020-04-20 05:15:13
77.31.212.107 attackspam
Unauthorized connection attempt from IP address 77.31.212.107 on Port 445(SMB)
2020-04-20 05:25:11

Recently Reported IPs

88.231.238.178 17.156.214.215 101.37.88.44 95.59.13.142
60.249.190.250 2.224.108.30 181.49.117.159 209.19.77.174
62.3.184.43 211.109.3.157 53.30.192.195 85.84.131.196
189.79.68.211 80.36.207.117 54.203.112.169 135.169.56.175
34.196.217.127 116.233.127.52 85.185.73.101 58.243.211.143