Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Slovakia (SLOVAK Republic)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.197.212.182
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15191
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.197.212.182.		IN	A

;; AUTHORITY SECTION:
.			415	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022072202 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 23 09:11:30 CST 2022
;; MSG SIZE  rcvd: 108
Host info
b'182.212.197.158.in-addr.arpa domain name pointer S2P2.ff.upjs.sk.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
182.212.197.158.in-addr.arpa	name = S2P2.ff.upjs.sk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.40.241.96 attackspambots
ECShop Remote Code Execution Vulnerability
2019-07-07 01:10:44
159.65.109.241 attackbots
Automatic report - Web App Attack
2019-07-07 00:59:19
82.162.59.47 attack
POP
2019-07-07 00:57:20
54.36.221.51 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-07-07 00:40:59
49.231.222.1 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-06 15:38:37,919 INFO [amun_request_handler] PortScan Detected on Port: 445 (49.231.222.1)
2019-07-07 00:09:20
36.66.74.234 attack
Unauthorized connection attempt from IP address 36.66.74.234 on Port 445(SMB)
2019-07-07 00:36:57
113.173.250.22 attackspambots
Jul  6 16:30:50 srv-4 sshd\[13395\]: Invalid user admin from 113.173.250.22
Jul  6 16:30:50 srv-4 sshd\[13395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.173.250.22
Jul  6 16:30:52 srv-4 sshd\[13395\]: Failed password for invalid user admin from 113.173.250.22 port 43668 ssh2
...
2019-07-07 00:29:43
149.56.20.183 attackspambots
Jul  6 17:00:50 giegler sshd[6506]: Invalid user audreym from 149.56.20.183 port 42916
2019-07-07 00:15:02
119.29.242.84 attackbotsspam
[ssh] SSH attack
2019-07-07 00:28:32
185.176.27.34 attackspambots
firewall-block, port(s): 17684/tcp
2019-07-07 00:49:44
80.82.64.127 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-07 01:04:55
31.135.115.210 attackspam
Unauthorized connection attempt from IP address 31.135.115.210 on Port 445(SMB)
2019-07-07 00:19:38
192.144.158.151 attack
Jul  6 16:37:49 core01 sshd\[16730\]: Invalid user jenkins from 192.144.158.151 port 40620
Jul  6 16:37:49 core01 sshd\[16730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.158.151
...
2019-07-07 00:10:00
81.183.218.26 attack
Unauthorized connection attempt from IP address 81.183.218.26 on Port 445(SMB)
2019-07-07 00:20:47
36.226.112.162 attack
Unauthorized connection attempt from IP address 36.226.112.162 on Port 445(SMB)
2019-07-07 00:39:16

Recently Reported IPs

158.197.249.7 158.2.245.26 158.199.13.161 158.197.210.210
158.199.43.21 158.199.209.191 158.197.80.201 158.198.189.74
158.197.45.179 158.198.160.72 158.199.161.154 158.199.130.184
158.197.229.188 158.197.248.175 158.197.200.89 158.196.221.88
158.196.51.231 158.197.126.254 158.198.76.60 158.198.84.191