Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.222.195.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2877
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.222.195.147.		IN	A

;; AUTHORITY SECTION:
.			125	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012801 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 29 07:39:53 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 147.195.222.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.195.222.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.178.29.191 attackspam
$f2bV_matches
2020-04-21 12:51:04
178.128.162.10 attackspambots
Apr 21 06:51:26 lukav-desktop sshd\[14597\]: Invalid user ck from 178.128.162.10
Apr 21 06:51:26 lukav-desktop sshd\[14597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.162.10
Apr 21 06:51:29 lukav-desktop sshd\[14597\]: Failed password for invalid user ck from 178.128.162.10 port 58254 ssh2
Apr 21 06:56:35 lukav-desktop sshd\[14914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.162.10  user=root
Apr 21 06:56:38 lukav-desktop sshd\[14914\]: Failed password for root from 178.128.162.10 port 47958 ssh2
2020-04-21 12:59:15
112.85.76.191 attack
DATE:2020-04-21 05:57:24, IP:112.85.76.191, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-04-21 12:21:19
129.226.161.114 attackbots
Apr 21 06:31:32 host sshd[34496]: Invalid user rj from 129.226.161.114 port 39358
...
2020-04-21 12:49:22
45.162.216.10 attackspambots
Apr 21 10:47:47 itv-usvr-01 sshd[1037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.162.216.10  user=ubuntu
Apr 21 10:47:49 itv-usvr-01 sshd[1037]: Failed password for ubuntu from 45.162.216.10 port 51216 ssh2
Apr 21 10:52:33 itv-usvr-01 sshd[1206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.162.216.10  user=ubuntu
Apr 21 10:52:35 itv-usvr-01 sshd[1206]: Failed password for ubuntu from 45.162.216.10 port 60225 ssh2
Apr 21 10:57:11 itv-usvr-01 sshd[1399]: Invalid user oracle from 45.162.216.10
2020-04-21 12:35:08
175.99.95.246 attackbots
Invalid user kw from 175.99.95.246 port 56226
2020-04-21 12:59:41
40.73.77.191 attack
2020-04-21T03:52:44.437832shield sshd\[11471\]: Invalid user si from 40.73.77.191 port 44209
2020-04-21T03:52:44.441546shield sshd\[11471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.77.191
2020-04-21T03:52:46.983995shield sshd\[11471\]: Failed password for invalid user si from 40.73.77.191 port 44209 ssh2
2020-04-21T03:57:11.887005shield sshd\[12226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.77.191  user=root
2020-04-21T03:57:14.087743shield sshd\[12226\]: Failed password for root from 40.73.77.191 port 46478 ssh2
2020-04-21 12:32:27
120.28.167.33 attackspambots
2020-04-21T03:45:05.659301ionos.janbro.de sshd[39283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.28.167.33  user=root
2020-04-21T03:45:07.537335ionos.janbro.de sshd[39283]: Failed password for root from 120.28.167.33 port 48708 ssh2
2020-04-21T03:51:10.930833ionos.janbro.de sshd[39323]: Invalid user admin from 120.28.167.33 port 37956
2020-04-21T03:51:11.087279ionos.janbro.de sshd[39323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.28.167.33
2020-04-21T03:51:10.930833ionos.janbro.de sshd[39323]: Invalid user admin from 120.28.167.33 port 37956
2020-04-21T03:51:12.874976ionos.janbro.de sshd[39323]: Failed password for invalid user admin from 120.28.167.33 port 37956 ssh2
2020-04-21T03:57:11.521797ionos.janbro.de sshd[39351]: Invalid user gitolite from 120.28.167.33 port 55432
2020-04-21T03:57:11.601044ionos.janbro.de sshd[39351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e
...
2020-04-21 12:32:03
210.115.225.135 attackspambots
Apr 20 23:57:08 mail sshd\[703\]: Invalid user wo from 210.115.225.135
Apr 20 23:57:08 mail sshd\[703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.115.225.135
...
2020-04-21 12:36:57
89.248.160.178 attack
[MK-Root1] Blocked by UFW
2020-04-21 12:45:08
189.127.37.135 attackspambots
" "
2020-04-21 12:51:27
138.68.31.105 attack
Apr 21 06:57:30 vpn01 sshd[10849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.31.105
Apr 21 06:57:32 vpn01 sshd[10849]: Failed password for invalid user tx from 138.68.31.105 port 38556 ssh2
...
2020-04-21 13:00:36
46.101.6.56 attackbots
2020-04-21T04:07:00.763356abusebot-4.cloudsearch.cf sshd[23340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.6.56  user=root
2020-04-21T04:07:02.487608abusebot-4.cloudsearch.cf sshd[23340]: Failed password for root from 46.101.6.56 port 44706 ssh2
2020-04-21T04:11:15.362624abusebot-4.cloudsearch.cf sshd[23641]: Invalid user mg from 46.101.6.56 port 35900
2020-04-21T04:11:15.368226abusebot-4.cloudsearch.cf sshd[23641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.6.56
2020-04-21T04:11:15.362624abusebot-4.cloudsearch.cf sshd[23641]: Invalid user mg from 46.101.6.56 port 35900
2020-04-21T04:11:17.433644abusebot-4.cloudsearch.cf sshd[23641]: Failed password for invalid user mg from 46.101.6.56 port 35900 ssh2
2020-04-21T04:15:31.051299abusebot-4.cloudsearch.cf sshd[23911]: Invalid user test123 from 46.101.6.56 port 55332
...
2020-04-21 12:58:46
221.208.226.45 attackspam
Multiple failed FTP logins
2020-04-21 12:27:34
113.193.243.35 attack
Apr 21 06:43:16 mail sshd[25934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.193.243.35
Apr 21 06:43:18 mail sshd[25934]: Failed password for invalid user test from 113.193.243.35 port 22788 ssh2
Apr 21 06:49:40 mail sshd[27459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.193.243.35
2020-04-21 13:01:52

Recently Reported IPs

147.44.240.211 17.225.80.40 96.82.231.205 123.218.102.103
155.40.65.224 109.161.73.41 113.138.38.220 1.227.146.92
241.103.164.168 48.25.43.241 60.219.200.226 211.195.113.28
188.95.24.33 160.18.53.209 8.96.223.206 201.239.72.37
47.44.13.185 98.81.241.102 94.158.167.250 103.224.18.91