Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Guensberg

Region: Solothurn

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.145.64.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58075
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.145.64.66.			IN	A

;; AUTHORITY SECTION:
.			482	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010501 1800 900 604800 86400

;; Query time: 130 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 06 05:19:24 CST 2020
;; MSG SIZE  rcvd: 115
Host info
66.64.145.5.in-addr.arpa domain name pointer 66-64-145-5.dyn.cable.fcom.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.64.145.5.in-addr.arpa	name = 66-64-145-5.dyn.cable.fcom.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
62.234.131.141 attack
Invalid user oow from 62.234.131.141 port 55048
2020-01-10 22:43:38
42.81.160.96 attackspam
Invalid user vud from 42.81.160.96 port 40542
2020-01-10 22:47:49
122.227.224.10 attack
Invalid user mw from 122.227.224.10 port 29894
2020-01-10 23:09:51
186.67.248.5 attack
Jan 10 07:44:18 onepro2 sshd[11575]: Failed password for invalid user szl from 186.67.248.5 port 58730 ssh2
Jan 10 08:09:45 onepro2 sshd[11593]: Failed password for invalid user pwd from 186.67.248.5 port 56403 ssh2
Jan 10 08:23:21 onepro2 sshd[11606]: Failed password for invalid user tomcat7 from 186.67.248.5 port 46396 ssh2
2020-01-10 22:57:19
180.215.213.158 attack
Jan 10 14:39:29 extapp sshd[28960]: Invalid user user from 180.215.213.158
Jan 10 14:39:30 extapp sshd[28960]: Failed password for invalid user user from 180.215.213.158 port 54512 ssh2
Jan 10 14:42:14 extapp sshd[30003]: Invalid user co from 180.215.213.158


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=180.215.213.158
2020-01-10 22:59:43
24.135.6.227 attack
Invalid user user from 24.135.6.227 port 51165
2020-01-10 22:49:18
139.59.90.40 attackspambots
Invalid user pentakill from 139.59.90.40 port 14310
2020-01-10 23:07:54
192.99.7.71 attackbots
Invalid user Administrator from 192.99.7.71 port 22476
2020-01-10 22:55:25
181.40.76.162 attack
Invalid user zp from 181.40.76.162 port 46918
2020-01-10 22:59:14
37.186.38.250 attackspambots
Invalid user pi from 37.186.38.250 port 7786
2020-01-10 22:48:23
85.192.138.149 attack
Invalid user n from 85.192.138.149 port 50084
2020-01-10 22:42:02
139.180.137.254 attackbots
Invalid user tc from 139.180.137.254 port 39268
2020-01-10 23:07:33
104.178.162.203 attackspam
unauthorized connection attempt
2020-01-10 22:39:45
178.32.49.19 attackbots
$f2bV_matches
2020-01-10 23:00:53
31.210.180.57 attackbotsspam
Invalid user admin from 31.210.180.57 port 14178
2020-01-10 22:49:02

Recently Reported IPs

126.181.223.254 182.96.84.226 176.153.51.120 49.146.44.139
70.35.114.92 94.50.162.183 206.46.86.69 75.138.96.252
32.203.202.0 41.204.96.75 97.80.194.204 41.38.224.151
50.92.65.16 95.207.49.74 78.148.30.197 41.38.213.11
197.230.132.6 218.40.67.103 41.34.17.3 35.115.26.64