Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Smolensk

Region: Smolenskaya Oblast'

Country: Russia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

%ERROR:101: no entries found
%
% No entries found in source RIPE.

% This query was served by the RIPE Database Query Service version 1.122 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 005.145.212.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21326
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;005.145.212.163.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050100 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 01 22:30:21 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 005.145.212.163 not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 005.145.212.163: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.247.152.15 attackbotsspam
Mar 24 10:51:17 intra sshd\[14964\]: Invalid user fcweb from 117.247.152.15Mar 24 10:51:18 intra sshd\[14964\]: Failed password for invalid user fcweb from 117.247.152.15 port 57206 ssh2Mar 24 10:56:22 intra sshd\[15028\]: Invalid user modifications from 117.247.152.15Mar 24 10:56:24 intra sshd\[15028\]: Failed password for invalid user modifications from 117.247.152.15 port 58574 ssh2Mar 24 11:00:11 intra sshd\[15081\]: Invalid user pf from 117.247.152.15Mar 24 11:00:13 intra sshd\[15081\]: Failed password for invalid user pf from 117.247.152.15 port 46078 ssh2
...
2020-03-24 17:17:46
221.199.61.122 attackbotsspam
Unauthorized connection attempt detected from IP address 221.199.61.122 to port 5555 [T]
2020-03-24 17:41:34
195.216.210.178 attackspambots
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-03-24 17:22:47
203.195.245.13 attackspambots
2020-03-24T08:57:46.467628abusebot-6.cloudsearch.cf sshd[30073]: Invalid user staveli from 203.195.245.13 port 60786
2020-03-24T08:57:46.475035abusebot-6.cloudsearch.cf sshd[30073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.245.13
2020-03-24T08:57:46.467628abusebot-6.cloudsearch.cf sshd[30073]: Invalid user staveli from 203.195.245.13 port 60786
2020-03-24T08:57:47.871476abusebot-6.cloudsearch.cf sshd[30073]: Failed password for invalid user staveli from 203.195.245.13 port 60786 ssh2
2020-03-24T08:59:46.561268abusebot-6.cloudsearch.cf sshd[30222]: Invalid user troqueles from 203.195.245.13 port 51174
2020-03-24T08:59:46.570080abusebot-6.cloudsearch.cf sshd[30222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.245.13
2020-03-24T08:59:46.561268abusebot-6.cloudsearch.cf sshd[30222]: Invalid user troqueles from 203.195.245.13 port 51174
2020-03-24T08:59:48.442889abusebot-6.cloudsearch.c
...
2020-03-24 17:25:22
62.234.62.206 attackspam
Mar 24 09:49:24 ns382633 sshd\[20321\]: Invalid user speech-dispatcher from 62.234.62.206 port 43010
Mar 24 09:49:24 ns382633 sshd\[20321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.62.206
Mar 24 09:49:26 ns382633 sshd\[20321\]: Failed password for invalid user speech-dispatcher from 62.234.62.206 port 43010 ssh2
Mar 24 09:59:35 ns382633 sshd\[22227\]: Invalid user rfonseca from 62.234.62.206 port 60650
Mar 24 09:59:35 ns382633 sshd\[22227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.62.206
2020-03-24 17:36:59
152.136.42.90 attackspambots
Unauthorized connection attempt detected from IP address 152.136.42.90 to port 22 [T]
2020-03-24 17:49:22
71.76.81.191 attackbots
fail2ban - Attack against Apache (too many 404s)
2020-03-24 17:11:09
118.174.46.138 attack
Unauthorized connection attempt detected from IP address 118.174.46.138 to port 445 [T]
2020-03-24 17:52:32
180.250.194.171 attackspambots
Unauthorized connection attempt detected from IP address 180.250.194.171 to port 445 [T]
2020-03-24 17:44:42
217.61.6.112 attack
Mar 24 10:13:48 eventyay sshd[2081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.6.112
Mar 24 10:13:50 eventyay sshd[2081]: Failed password for invalid user www from 217.61.6.112 port 50584 ssh2
Mar 24 10:18:36 eventyay sshd[2152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.6.112
...
2020-03-24 17:27:13
159.65.157.194 attackspambots
Mar 24 09:51:45 markkoudstaal sshd[19385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.157.194
Mar 24 09:51:47 markkoudstaal sshd[19385]: Failed password for invalid user admin from 159.65.157.194 port 46268 ssh2
Mar 24 09:59:52 markkoudstaal sshd[20509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.157.194
2020-03-24 17:21:32
218.92.0.189 attack
03/24/2020-05:22:10.666230 218.92.0.189 Protocol: 6 ET SCAN Potential SSH Scan
2020-03-24 17:22:20
49.232.13.96 attackbots
Mar 24 09:59:52 srv206 sshd[21673]: Invalid user ui from 49.232.13.96
Mar 24 09:59:52 srv206 sshd[21673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.13.96
Mar 24 09:59:52 srv206 sshd[21673]: Invalid user ui from 49.232.13.96
Mar 24 09:59:53 srv206 sshd[21673]: Failed password for invalid user ui from 49.232.13.96 port 42964 ssh2
...
2020-03-24 17:18:27
122.226.119.138 attackbots
Unauthorized connection attempt detected from IP address 122.226.119.138 to port 445 [T]
2020-03-24 17:50:43
152.136.142.30 attackbotsspam
detected by Fail2Ban
2020-03-24 17:32:31

Recently Reported IPs

2606:4700:10::6814:4791 121.234.219.106 66.132.195.118 73.190.161.230
244.137.108.193 105.91.115.55 2606:4700:10::6814:9611 54.83.23.103
192.168.10.41 2606:4700:10::ac43:1823 42.247.85.194 77.237.237.43
53.206.172.54 54.73.82.2 200.173.3.21 132.39.67.31
104.248.152.236 122.192.203.111 110.78.156.73 43.161.234.148