Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ziri

Region: Obcina Ziri

Country: Slovenia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.182.145.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21413
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;109.182.145.195.		IN	A

;; AUTHORITY SECTION:
.			368	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100501 1800 900 604800 86400

;; Query time: 329 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 06 03:20:02 CST 2019
;; MSG SIZE  rcvd: 119
Host info
195.145.182.109.in-addr.arpa domain name pointer BSN-182-145-195.dynamic.siol.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
195.145.182.109.in-addr.arpa	name = BSN-182-145-195.dynamic.siol.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.140.8.244 attackbots
Unauthorised access (Jul  4) SRC=222.140.8.244 LEN=40 TTL=49 ID=65333 TCP DPT=23 WINDOW=40127 SYN 
Unauthorised access (Jul  3) SRC=222.140.8.244 LEN=40 TTL=49 ID=24252 TCP DPT=23 WINDOW=40127 SYN
2019-07-04 21:34:33
50.116.97.191 attackspam
Automatic report generated by Wazuh
2019-07-04 21:40:57
134.175.42.162 attackbots
Jul  4 15:45:48 amit sshd\[21392\]: Invalid user deborah from 134.175.42.162
Jul  4 15:45:48 amit sshd\[21392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.42.162
Jul  4 15:45:49 amit sshd\[21392\]: Failed password for invalid user deborah from 134.175.42.162 port 33818 ssh2
...
2019-07-04 22:08:19
163.172.106.114 attackbots
Jul  4 15:46:07 lnxmysql61 sshd[18535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.106.114
Jul  4 15:46:09 lnxmysql61 sshd[18535]: Failed password for invalid user 123root from 163.172.106.114 port 55006 ssh2
Jul  4 15:51:22 lnxmysql61 sshd[19075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.106.114
2019-07-04 21:53:34
62.80.161.162 attack
Many RDP login attempts detected by IDS script
2019-07-04 22:17:04
94.253.55.72 attackbots
Helo
2019-07-04 21:30:40
212.83.145.12 attack
\[2019-07-04 09:39:30\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-04T09:39:30.551-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011972592277524",SessionID="0x7f02f8352a28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.145.12/61941",ACLName="no_extension_match"
\[2019-07-04 09:42:16\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-04T09:42:16.302-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011972592277524",SessionID="0x7f02f8352a28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.145.12/64539",ACLName="no_extension_match"
\[2019-07-04 09:45:18\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-04T09:45:18.019-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0011972592277524",SessionID="0x7f02f8352a28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.145.12/63461",ACLName="n
2019-07-04 22:00:40
41.228.12.249 attackspambots
2019-07-04T13:17:25.413393abusebot-8.cloudsearch.cf sshd\[7130\]: Invalid user huang from 41.228.12.249 port 60885
2019-07-04 21:37:08
139.162.60.32 attackspambots
" "
2019-07-04 22:02:22
45.13.39.24 attackbots
2 weeks under attack from this range IP 45.13.39.0/24.
SMTP Auth Failure - Client	[45.13.39.53]
2019-07-04 22:04:17
178.79.4.6 attackbotsspam
DATE:2019-07-04 15:17:23, IP:178.79.4.6, PORT:ssh brute force auth on SSH service (patata)
2019-07-04 21:40:20
82.209.217.20 attack
Brute force attempt
2019-07-04 21:49:40
129.204.219.180 attack
Jul  4 15:13:33 vps691689 sshd[15929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.219.180
Jul  4 15:13:35 vps691689 sshd[15929]: Failed password for invalid user bot from 129.204.219.180 port 55956 ssh2
Jul  4 15:16:19 vps691689 sshd[15946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.219.180
...
2019-07-04 22:12:12
159.203.77.51 attackbots
04.07.2019 13:16:48 SSH access blocked by firewall
2019-07-04 21:58:34
45.119.212.105 attackbots
Jul  4 08:15:55 aat-srv002 sshd[8565]: Failed password for root from 45.119.212.105 port 33226 ssh2
Jul  4 08:16:39 aat-srv002 sshd[8587]: Failed password for root from 45.119.212.105 port 51238 ssh2
Jul  4 08:17:23 aat-srv002 sshd[8604]: Failed password for root from 45.119.212.105 port 41018 ssh2
...
2019-07-04 21:39:48

Recently Reported IPs

212.86.58.111 94.196.201.235 99.167.70.205 125.110.143.143
67.108.66.40 121.188.250.74 1.52.174.91 130.176.1.228
173.20.21.252 36.66.106.112 199.20.87.101 168.122.72.254
211.46.58.24 76.76.183.221 177.170.91.188 41.152.92.225
222.45.163.7 1.26.246.128 122.138.9.148 24.50.75.230