Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Camden Town

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.148.145.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50595
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.148.145.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:12:49 CST 2025
;; MSG SIZE  rcvd: 106
Host info
145.145.148.5.in-addr.arpa domain name pointer ser033800.ixhs.uk.exponential-e.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.145.148.5.in-addr.arpa	name = ser033800.ixhs.uk.exponential-e.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.33.147.54 attack
1433/tcp
[2020-07-08]1pkt
2020-07-09 00:27:02
208.126.79.245 attack
23/tcp
[2020-07-08]1pkt
2020-07-09 01:02:10
211.199.142.128 attackbotsspam
 TCP (SYN) 211.199.142.128:37583 -> port 80, len 44
2020-07-09 00:42:06
87.208.56.229 attackbots
Jul  8 17:10:50 ncomp sshd[1723]: Invalid user pi from 87.208.56.229
Jul  8 17:10:50 ncomp sshd[1724]: Invalid user pi from 87.208.56.229
2020-07-09 00:50:44
43.243.37.87 attack
Unauthorized connection attempt from IP address 43.243.37.87 on Port 445(SMB)
2020-07-09 00:41:08
201.248.207.156 attack
Jul  8 14:36:01 vlre-nyc-1 sshd\[28142\]: Invalid user user from 201.248.207.156
Jul  8 14:36:01 vlre-nyc-1 sshd\[28142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.248.207.156
Jul  8 14:36:02 vlre-nyc-1 sshd\[28142\]: Failed password for invalid user user from 201.248.207.156 port 43474 ssh2
Jul  8 14:43:18 vlre-nyc-1 sshd\[28280\]: Invalid user farris from 201.248.207.156
Jul  8 14:43:18 vlre-nyc-1 sshd\[28280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.248.207.156
...
2020-07-09 00:51:08
206.189.222.181 attackbots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-08T15:06:59Z and 2020-07-08T15:13:20Z
2020-07-09 00:38:01
200.8.179.3 attackbotsspam
23/tcp
[2020-07-08]1pkt
2020-07-09 00:53:03
93.109.121.119 attackbotsspam
1594208778 - 07/08/2020 13:46:18 Host: 93.109.121.119/93.109.121.119 Port: 445 TCP Blocked
2020-07-09 00:40:30
188.170.192.114 attack
445/tcp
[2020-07-08]1pkt
2020-07-09 00:33:47
162.243.144.225 attackspam
[Sat Jun 06 12:17:55 2020] - DDoS Attack From IP: 162.243.144.225 Port: 38187
2020-07-09 00:26:00
168.253.215.2 attackbotsspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-07-09 00:53:22
41.214.50.9 attackbots
445/tcp 445/tcp 445/tcp
[2020-07-08]3pkt
2020-07-09 00:31:14
180.76.148.87 attackbots
(sshd) Failed SSH login from 180.76.148.87 (CN/China/-): 5 in the last 3600 secs
2020-07-09 00:31:34
117.247.232.138 attack
Unauthorized connection attempt from IP address 117.247.232.138 on Port 445(SMB)
2020-07-09 01:02:49

Recently Reported IPs

38.180.63.135 3.231.199.175 29.219.201.193 22.8.43.37
251.115.60.140 149.178.121.200 107.157.158.175 196.230.92.205
46.2.135.219 245.192.4.190 139.31.24.14 14.47.86.55
34.70.14.138 200.22.30.15 203.169.75.208 240.189.209.71
235.90.153.102 225.84.66.160 138.232.186.230 148.151.205.110