Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Serbia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.245.173.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5523
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.245.173.214.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:38:27 CST 2025
;; MSG SIZE  rcvd: 108
Host info
214.173.245.109.in-addr.arpa domain name pointer net214-173-245-109.dynamic.mbb.yettel.rs.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.173.245.109.in-addr.arpa	name = net214-173-245-109.dynamic.mbb.yettel.rs.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.16.37.135 attackspambots
2020-04-27T10:26:54.664870ns386461 sshd\[14482\]: Invalid user ertu from 185.16.37.135 port 39422
2020-04-27T10:26:54.669407ns386461 sshd\[14482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.16.37.135
2020-04-27T10:26:56.468829ns386461 sshd\[14482\]: Failed password for invalid user ertu from 185.16.37.135 port 39422 ssh2
2020-04-27T10:37:25.475911ns386461 sshd\[23719\]: Invalid user angie from 185.16.37.135 port 53242
2020-04-27T10:37:25.480378ns386461 sshd\[23719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.16.37.135
...
2020-04-27 16:57:39
62.28.253.197 attackbots
Invalid user yux from 62.28.253.197 port 14492
2020-04-27 16:33:15
203.213.66.170 attackbots
Apr 27 05:53:15 mout sshd[16887]: Invalid user prueba from 203.213.66.170 port 37285
2020-04-27 17:05:23
45.55.179.132 attackspam
$f2bV_matches
2020-04-27 16:59:07
103.107.198.78 attack
Multiple Scan.Generic.PortScan.UDP attack.
2020-04-27 16:52:29
165.22.48.227 attackbotsspam
Apr 27 10:27:13 OPSO sshd\[18063\]: Invalid user web from 165.22.48.227 port 55286
Apr 27 10:27:13 OPSO sshd\[18063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.48.227
Apr 27 10:27:15 OPSO sshd\[18063\]: Failed password for invalid user web from 165.22.48.227 port 55286 ssh2
Apr 27 10:31:55 OPSO sshd\[19195\]: Invalid user search from 165.22.48.227 port 40222
Apr 27 10:31:55 OPSO sshd\[19195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.48.227
2020-04-27 16:47:41
45.55.32.34 attackspambots
Apr 27 08:15:45 debian-2gb-nbg1-2 kernel: \[10227077.600183\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.55.32.34 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=3830 PROTO=TCP SPT=49801 DPT=30331 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-27 16:32:25
167.99.66.193 attack
Apr 27 09:52:04 ns382633 sshd\[22735\]: Invalid user amp from 167.99.66.193 port 33639
Apr 27 09:52:04 ns382633 sshd\[22735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.66.193
Apr 27 09:52:06 ns382633 sshd\[22735\]: Failed password for invalid user amp from 167.99.66.193 port 33639 ssh2
Apr 27 10:02:56 ns382633 sshd\[24691\]: Invalid user vic from 167.99.66.193 port 45789
Apr 27 10:02:56 ns382633 sshd\[24691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.66.193
2020-04-27 17:01:18
120.92.155.102 attackspam
Apr 27 13:42:58 gw1 sshd[7320]: Failed password for root from 120.92.155.102 port 64930 ssh2
...
2020-04-27 17:07:31
27.254.130.67 attackspambots
"Unauthorized connection attempt on SSHD detected"
2020-04-27 16:51:51
106.13.36.10 attack
Invalid user mango from 106.13.36.10 port 60814
2020-04-27 16:38:39
14.143.64.114 attack
Apr 27 07:15:49 meumeu sshd[23123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.143.64.114 
Apr 27 07:15:51 meumeu sshd[23123]: Failed password for invalid user vmail from 14.143.64.114 port 55740 ssh2
Apr 27 07:19:34 meumeu sshd[23623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.143.64.114 
...
2020-04-27 17:06:57
94.23.101.187 attackspambots
[ssh] SSH attack
2020-04-27 17:08:00
122.51.45.240 attackbotsspam
Apr 27 10:25:06 xeon sshd[61417]: Failed password for invalid user dba from 122.51.45.240 port 56452 ssh2
2020-04-27 16:49:04
173.245.239.178 attack
Automatic report - WordPress Brute Force
2020-04-27 16:46:52

Recently Reported IPs

54.75.148.182 241.212.70.241 33.126.68.108 188.202.35.18
227.69.241.91 203.117.206.135 130.141.236.8 135.85.236.223
160.181.213.208 13.107.149.157 30.66.25.30 14.165.248.235
72.47.76.72 123.179.218.193 197.209.22.221 53.89.183.221
153.201.253.12 58.2.234.189 231.12.158.198 143.206.196.15