Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nagakute

Region: Aichi

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: Chubu Telecommunications Company, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.199.207.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33678
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;180.199.207.145.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071300 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 14 02:02:28 CST 2019
;; MSG SIZE  rcvd: 119
Host info
145.207.199.180.in-addr.arpa domain name pointer 180-199-207-145.nagoya1.commufa.jp.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
145.207.199.180.in-addr.arpa	name = 180-199-207-145.nagoya1.commufa.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.117 attackbotsspam
Aug 28 04:43:05 django-0 sshd[11972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.117  user=root
Aug 28 04:43:07 django-0 sshd[11972]: Failed password for root from 49.88.112.117 port 49795 ssh2
...
2020-08-28 13:17:14
45.142.120.209 attackbotsspam
2020-08-28 05:41:13 dovecot_login authenticator failed for \(User\) \[45.142.120.209\]: 535 Incorrect authentication data \(set_id=voyager@no-server.de\)
2020-08-28 05:41:34 dovecot_login authenticator failed for \(User\) \[45.142.120.209\]: 535 Incorrect authentication data \(set_id=voyager@no-server.de\)
2020-08-28 05:41:39 dovecot_login authenticator failed for \(User\) \[45.142.120.209\]: 535 Incorrect authentication data \(set_id=voyager@no-server.de\)
2020-08-28 05:42:19 dovecot_login authenticator failed for \(User\) \[45.142.120.209\]: 535 Incorrect authentication data \(set_id=gizzmo@no-server.de\)
2020-08-28 05:42:26 dovecot_login authenticator failed for \(User\) \[45.142.120.209\]: 535 Incorrect authentication data \(set_id=gizzmo@no-server.de\)
2020-08-28 05:42:38 dovecot_login authenticator failed for \(User\) \[45.142.120.209\]: 535 Incorrect authentication data \(set_id=lorrie@no-server.de\)
2020-08-28 05:43:02 dovecot_login authenticator failed for \(User\) \[45.142.12
...
2020-08-28 12:58:25
47.32.139.150 attackspambots
Automatic report - Banned IP Access
2020-08-28 12:46:43
103.19.110.38 attackbots
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-08-28 12:59:25
180.166.117.254 attack
Invalid user admin from 180.166.117.254 port 4988
2020-08-28 13:00:52
115.84.91.211 attackbots
SSH invalid-user multiple login try
2020-08-28 12:58:06
77.47.130.58 attack
Invalid user sdt from 77.47.130.58 port 34537
2020-08-28 13:16:51
194.204.123.123 attackbots
port scan and connect, tcp 1433 (ms-sql-s)
2020-08-28 12:43:18
193.112.108.11 attackbots
Fail2Ban Ban Triggered (2)
2020-08-28 12:53:42
212.170.50.203 attack
Invalid user lhz from 212.170.50.203 port 46754
2020-08-28 13:10:22
188.166.5.84 attackbots
Aug 28 05:55:25 haigwepa sshd[17962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.5.84 
Aug 28 05:55:27 haigwepa sshd[17962]: Failed password for invalid user k from 188.166.5.84 port 56814 ssh2
...
2020-08-28 13:05:27
103.99.189.230 attackbots
Aug 27 19:49:02 www sshd[24477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.189.230  user=r.r
Aug 27 19:49:04 www sshd[24477]: Failed password for r.r from 103.99.189.230 port 44850 ssh2
Aug 27 19:49:04 www sshd[24477]: Received disconnect from 103.99.189.230: 11: Bye Bye [preauth]
Aug 27 20:01:09 www sshd[25356]: Invalid user diana from 103.99.189.230
Aug 27 20:01:09 www sshd[25356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.189.230 
Aug 27 20:01:12 www sshd[25356]: Failed password for invalid user diana from 103.99.189.230 port 45474 ssh2
Aug 27 20:01:12 www sshd[25356]: Received disconnect from 103.99.189.230: 11: Bye Bye [preauth]
Aug 27 20:05:57 www sshd[25653]: Invalid user admin from 103.99.189.230
Aug 27 20:05:57 www sshd[25653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.189.230 
Aug 27 20:05:59 www sshd[25........
-------------------------------
2020-08-28 12:59:11
104.248.66.115 attackspambots
Invalid user sky from 104.248.66.115 port 60958
2020-08-28 12:59:41
122.152.233.188 attackbotsspam
Aug 27 21:44:13 dignus sshd[22577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.233.188  user=root
Aug 27 21:44:15 dignus sshd[22577]: Failed password for root from 122.152.233.188 port 35104 ssh2
Aug 27 21:46:58 dignus sshd[22888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.233.188  user=git
Aug 27 21:47:00 dignus sshd[22888]: Failed password for git from 122.152.233.188 port 38002 ssh2
Aug 27 21:49:38 dignus sshd[23210]: Invalid user yzj from 122.152.233.188 port 40896
...
2020-08-28 13:13:25
85.209.0.102 attack
Invalid user admin from 85.209.0.102 port 4550
2020-08-28 13:03:40

Recently Reported IPs

209.46.247.151 85.96.195.103 209.232.76.164 37.204.97.38
85.196.94.79 91.203.202.76 4.91.189.244 63.154.152.146
190.71.140.85 88.134.221.49 74.142.164.84 209.216.207.7
109.130.213.63 2003:6:39f:2b43:1516:5526:6b71:f961 201.0.245.110 166.146.180.29
73.168.65.115 199.81.74.16 4.241.228.241 183.21.40.151