Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Žilina

Region: Zilina

Country: Slovakia

Internet Service Provider: unknown

Hostname: unknown

Organization: Zdruzenie pouzivatelov Slovenskej akademickej datovej siete

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.193.189.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39969
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;158.193.189.248.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080801 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 09 03:39:10 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 248.189.193.158.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 248.189.193.158.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.59.131.128 attackspam
1591588176 - 06/08/2020 05:49:36 Host: 27.59.131.128/27.59.131.128 Port: 445 TCP Blocked
2020-06-08 16:39:46
180.76.108.73 attackbotsspam
Jun  8 07:56:50 our-server-hostname sshd[25366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.108.73  user=r.r
Jun  8 07:56:52 our-server-hostname sshd[25366]: Failed password for r.r from 180.76.108.73 port 53874 ssh2
Jun  8 08:13:28 our-server-hostname sshd[29311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.108.73  user=r.r
Jun  8 08:13:29 our-server-hostname sshd[29311]: Failed password for r.r from 180.76.108.73 port 47374 ssh2
Jun  8 08:17:22 our-server-hostname sshd[30118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.108.73  user=r.r
Jun  8 08:17:24 our-server-hostname sshd[30118]: Failed password for r.r from 180.76.108.73 port 41930 ssh2
Jun  8 08:21:09 our-server-hostname sshd[30863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.108.73  user=r.r
Jun  8 08:21:10 ........
-------------------------------
2020-06-08 16:28:50
167.99.101.199 attackbotsspam
404 NOT FOUND
2020-06-08 16:08:32
192.144.207.22 attackbotsspam
5x Failed Password
2020-06-08 16:09:54
139.59.161.78 attackbotsspam
SSH brute-force: detected 1 distinct username(s) / 15 distinct password(s) within a 24-hour window.
2020-06-08 16:27:04
83.97.20.35 attackbots
Jun  8 11:11:39 debian kernel: [506457.348522] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=83.97.20.35 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=59219 DPT=995 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-08 16:16:00
212.64.71.173 attackspambots
Brute-force attempt banned
2020-06-08 16:21:05
178.62.21.80 attack
Jun  8 10:08:25 server sshd[7304]: Failed password for root from 178.62.21.80 port 39682 ssh2
Jun  8 10:12:03 server sshd[7836]: Failed password for root from 178.62.21.80 port 41206 ssh2
...
2020-06-08 16:33:27
161.35.22.86 attackspam
2020-06-08T08:03:32.372107abusebot-4.cloudsearch.cf sshd[10091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.22.86  user=root
2020-06-08T08:03:34.409165abusebot-4.cloudsearch.cf sshd[10091]: Failed password for root from 161.35.22.86 port 32818 ssh2
2020-06-08T08:03:55.011844abusebot-4.cloudsearch.cf sshd[10117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.22.86  user=root
2020-06-08T08:03:56.400878abusebot-4.cloudsearch.cf sshd[10117]: Failed password for root from 161.35.22.86 port 52722 ssh2
2020-06-08T08:04:17.505115abusebot-4.cloudsearch.cf sshd[10137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.22.86  user=root
2020-06-08T08:04:18.719339abusebot-4.cloudsearch.cf sshd[10137]: Failed password for root from 161.35.22.86 port 44274 ssh2
2020-06-08T08:04:39.505438abusebot-4.cloudsearch.cf sshd[10161]: pam_unix(sshd:auth): authenticat
...
2020-06-08 16:25:04
152.136.34.52 attackspambots
Jun  8 06:54:49 sip sshd[579938]: Failed password for root from 152.136.34.52 port 44630 ssh2
Jun  8 06:57:52 sip sshd[579973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.34.52  user=root
Jun  8 06:57:54 sip sshd[579973]: Failed password for root from 152.136.34.52 port 55822 ssh2
...
2020-06-08 16:29:18
39.155.221.190 attackbotsspam
Jun  8 06:41:02 lnxweb62 sshd[1042]: Failed password for root from 39.155.221.190 port 36214 ssh2
Jun  8 06:41:02 lnxweb62 sshd[1042]: Failed password for root from 39.155.221.190 port 36214 ssh2
2020-06-08 16:06:19
112.30.128.168 attackbotsspam
Port probing on unauthorized port 1433
2020-06-08 16:16:51
104.236.134.112 attackspambots
Jun  8 10:12:25 server sshd[31742]: Failed password for root from 104.236.134.112 port 43184 ssh2
Jun  8 10:17:39 server sshd[36425]: Failed password for root from 104.236.134.112 port 36513 ssh2
Jun  8 10:22:45 server sshd[41473]: Failed password for root from 104.236.134.112 port 58071 ssh2
2020-06-08 16:35:53
34.220.181.41 attackbots
Wordpress login scanning
2020-06-08 16:01:50
106.54.205.236 attackbotsspam
Lines containing failures of 106.54.205.236
Jun  8 03:27:56 supported sshd[14838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.205.236  user=r.r
Jun  8 03:27:58 supported sshd[14838]: Failed password for r.r from 106.54.205.236 port 44818 ssh2
Jun  8 03:28:01 supported sshd[14838]: Received disconnect from 106.54.205.236 port 44818:11: Bye Bye [preauth]
Jun  8 03:28:01 supported sshd[14838]: Disconnected from authenticating user r.r 106.54.205.236 port 44818 [preauth]
Jun  8 03:39:10 supported sshd[16619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.205.236  user=r.r
Jun  8 03:39:11 supported sshd[16619]: Failed password for r.r from 106.54.205.236 port 53764 ssh2
Jun  8 03:39:13 supported sshd[16619]: Received disconnect from 106.54.205.236 port 53764:11: Bye Bye [preauth]
Jun  8 03:39:13 supported sshd[16619]: Disconnected from authenticating user r.r 106.54.205.236 po........
------------------------------
2020-06-08 16:40:53

Recently Reported IPs

168.187.17.121 203.103.225.121 181.16.165.62 36.71.234.215
84.126.28.37 177.140.80.117 182.150.28.144 141.47.32.20
165.22.206.131 161.3.196.229 138.138.38.95 119.82.253.90
125.87.86.139 87.211.28.88 103.199.115.50 129.42.205.77
69.157.97.45 114.106.72.30 95.161.235.227 211.62.240.217