Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santa Clara

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.190.12.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29019
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.190.12.157.			IN	A

;; AUTHORITY SECTION:
.			243	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023022804 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 01 12:05:35 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 157.12.190.146.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.12.190.146.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
196.202.25.44 attackspam
1586866460 - 04/14/2020 14:14:20 Host: 196.202.25.44/196.202.25.44 Port: 445 TCP Blocked
2020-04-14 22:14:31
222.186.175.183 attack
Apr 14 15:06:25 combo sshd[16263]: Failed password for root from 222.186.175.183 port 2024 ssh2
Apr 14 15:06:29 combo sshd[16263]: Failed password for root from 222.186.175.183 port 2024 ssh2
Apr 14 15:06:33 combo sshd[16263]: Failed password for root from 222.186.175.183 port 2024 ssh2
...
2020-04-14 22:09:22
138.197.163.11 attack
20 attempts against mh-ssh on cloud
2020-04-14 22:34:13
45.227.255.149 attack
22 attempts against mh-misbehave-ban on ice
2020-04-14 22:21:29
190.113.142.197 attackspambots
Bruteforce detected by fail2ban
2020-04-14 22:39:49
49.233.13.145 attackbotsspam
prod3
...
2020-04-14 22:05:41
125.124.32.103 attackspam
Apr 14 15:24:29 dev0-dcde-rnet sshd[17673]: Failed password for root from 125.124.32.103 port 49020 ssh2
Apr 14 15:48:06 dev0-dcde-rnet sshd[18106]: Failed password for root from 125.124.32.103 port 52536 ssh2
2020-04-14 22:27:57
159.203.82.104 attackspambots
Apr 14 14:02:02 ip-172-31-62-245 sshd\[14374\]: Failed password for root from 159.203.82.104 port 54705 ssh2\
Apr 14 14:04:41 ip-172-31-62-245 sshd\[14426\]: Failed password for root from 159.203.82.104 port 49969 ssh2\
Apr 14 14:07:19 ip-172-31-62-245 sshd\[14452\]: Failed password for root from 159.203.82.104 port 45238 ssh2\
Apr 14 14:09:55 ip-172-31-62-245 sshd\[14538\]: Invalid user personnel from 159.203.82.104\
Apr 14 14:09:56 ip-172-31-62-245 sshd\[14538\]: Failed password for invalid user personnel from 159.203.82.104 port 40516 ssh2\
2020-04-14 22:10:25
222.186.180.41 attack
Apr 14 09:10:10 debian sshd[27208]: Unable to negotiate with 222.186.180.41 port 57218: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
Apr 14 10:33:34 debian sshd[677]: Unable to negotiate with 222.186.180.41 port 12440: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
...
2020-04-14 22:38:54
14.29.197.120 attackbots
Apr 14 14:07:42 h1745522 sshd[1153]: Invalid user coke from 14.29.197.120 port 22154
Apr 14 14:07:42 h1745522 sshd[1153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.197.120
Apr 14 14:07:42 h1745522 sshd[1153]: Invalid user coke from 14.29.197.120 port 22154
Apr 14 14:07:44 h1745522 sshd[1153]: Failed password for invalid user coke from 14.29.197.120 port 22154 ssh2
Apr 14 14:11:14 h1745522 sshd[1529]: Invalid user abcd from 14.29.197.120 port 42369
Apr 14 14:11:14 h1745522 sshd[1529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.197.120
Apr 14 14:11:14 h1745522 sshd[1529]: Invalid user abcd from 14.29.197.120 port 42369
Apr 14 14:11:16 h1745522 sshd[1529]: Failed password for invalid user abcd from 14.29.197.120 port 42369 ssh2
Apr 14 14:14:22 h1745522 sshd[1704]: Invalid user RERnegcm from 14.29.197.120 port 62585
...
2020-04-14 22:11:55
104.215.197.210 attack
Apr 14 15:14:58 server sshd[11812]: Failed password for invalid user mediator from 104.215.197.210 port 41694 ssh2
Apr 14 15:21:29 server sshd[16821]: Failed password for root from 104.215.197.210 port 44208 ssh2
Apr 14 15:27:43 server sshd[22699]: Failed password for root from 104.215.197.210 port 46780 ssh2
2020-04-14 22:18:42
96.64.7.59 attackbotsspam
sshd jail - ssh hack attempt
2020-04-14 22:29:23
60.199.131.62 attackbotsspam
Apr 14 15:39:31 minden010 sshd[18028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.199.131.62
Apr 14 15:39:32 minden010 sshd[18028]: Failed password for invalid user host from 60.199.131.62 port 44500 ssh2
Apr 14 15:44:06 minden010 sshd[18570]: Failed password for root from 60.199.131.62 port 55082 ssh2
...
2020-04-14 22:26:41
77.83.174.139 attackbots
14.04.2020 14:13:46 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-04-14 22:42:39
106.12.95.20 attackspambots
Apr 14 16:04:46 eventyay sshd[12494]: Failed password for root from 106.12.95.20 port 39492 ssh2
Apr 14 16:07:55 eventyay sshd[12655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.95.20
Apr 14 16:07:58 eventyay sshd[12655]: Failed password for invalid user marvin from 106.12.95.20 port 45870 ssh2
...
2020-04-14 22:11:25

Recently Reported IPs

166.198.44.206 240.107.41.44 185.253.1.235 104.139.46.10
17.74.74.187 117.104.165.216 181.226.90.225 232.47.48.0
77.215.219.32 208.51.255.119 37.166.201.110 141.230.61.196
241.19.47.210 251.249.29.88 8.213.255.79 37.35.5.62
217.96.70.200 206.208.39.22 134.39.50.214 247.145.64.126