Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Turkey

Internet Service Provider: SAGLAYICI Teknoloji Bilisim Yayincilik Hiz. Ticaret Ltd. Sti.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/195.142.106.150/ 
 TR - 1H : (232)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TR 
 NAME ASN : ASN199484 
 
 IP : 195.142.106.150 
 
 CIDR : 195.142.106.0/24 
 
 PREFIX COUNT : 61 
 
 UNIQUE IP COUNT : 25856 
 
 
 WYKRYTE ATAKI Z ASN199484 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-02 05:48:49 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-02 17:00:34
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.142.106.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27098
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;195.142.106.150.		IN	A

;; AUTHORITY SECTION:
.			333	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100200 1800 900 604800 86400

;; Query time: 134 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 02 17:00:26 CST 2019
;; MSG SIZE  rcvd: 119
Host info
150.106.142.195.in-addr.arpa domain name pointer 195-142-106-150.rdns.saglayici.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.106.142.195.in-addr.arpa	name = 195-142-106-150.rdns.saglayici.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.254.32.102 attackbots
Aug 16 16:29:16 ns381471 sshd[8618]: Failed password for postgres from 51.254.32.102 port 37336 ssh2
2020-08-17 01:37:40
123.207.99.184 attackbots
prod8
...
2020-08-17 01:53:34
183.89.237.34 attackspambots
Aug 16 06:22:01 Host-KLAX-C dovecot: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=183.89.237.34, lip=185.198.26.142, TLS, session=
...
2020-08-17 01:51:58
222.186.180.142 attackbotsspam
Aug 16 19:37:30 eventyay sshd[24250]: Failed password for root from 222.186.180.142 port 17058 ssh2
Aug 16 19:37:39 eventyay sshd[24255]: Failed password for root from 222.186.180.142 port 10074 ssh2
Aug 16 19:37:41 eventyay sshd[24255]: Failed password for root from 222.186.180.142 port 10074 ssh2
...
2020-08-17 01:38:13
176.236.198.30 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-17 01:52:31
179.124.34.9 attack
Aug 16 14:19:16 inter-technics sshd[2655]: Invalid user bav from 179.124.34.9 port 50021
Aug 16 14:19:16 inter-technics sshd[2655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.124.34.9
Aug 16 14:19:16 inter-technics sshd[2655]: Invalid user bav from 179.124.34.9 port 50021
Aug 16 14:19:18 inter-technics sshd[2655]: Failed password for invalid user bav from 179.124.34.9 port 50021 ssh2
Aug 16 14:22:22 inter-technics sshd[2907]: Invalid user emily from 179.124.34.9 port 42525
...
2020-08-17 01:28:26
103.48.190.32 attack
Fail2Ban Ban Triggered (2)
2020-08-17 01:33:28
177.177.122.143 attackbotsspam
Aug 16 17:18:18 root sshd[16143]: Failed password for root from 177.177.122.143 port 11393 ssh2
Aug 16 17:27:49 root sshd[17355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.177.122.143 
Aug 16 17:27:51 root sshd[17355]: Failed password for invalid user martin from 177.177.122.143 port 24129 ssh2
...
2020-08-17 01:32:15
122.114.9.237 attack
Aug 16 13:38:31 NPSTNNYC01T sshd[13249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.9.237
Aug 16 13:38:32 NPSTNNYC01T sshd[13249]: Failed password for invalid user zcy from 122.114.9.237 port 60524 ssh2
Aug 16 13:43:27 NPSTNNYC01T sshd[13636]: Failed password for root from 122.114.9.237 port 33646 ssh2
...
2020-08-17 01:46:23
14.29.189.236 attackspam
Aug 16 11:03:52 xxxxxxx9247313 sshd[14330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.189.236  user=r.r
Aug 16 11:03:53 xxxxxxx9247313 sshd[14330]: Failed password for r.r from 14.29.189.236 port 48378 ssh2
Aug 16 11:05:16 xxxxxxx9247313 sshd[14443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.189.236  user=r.r
Aug 16 11:05:18 xxxxxxx9247313 sshd[14443]: Failed password for r.r from 14.29.189.236 port 57434 ssh2
Aug 16 11:07:33 xxxxxxx9247313 sshd[14543]: Invalid user tomcat from 14.29.189.236
Aug 16 11:07:33 xxxxxxx9247313 sshd[14543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.189.236 
Aug 16 11:07:35 xxxxxxx9247313 sshd[14543]: Failed password for invalid user tomcat from 14.29.189.236 port 47292 ssh2
Aug 16 11:08:47 xxxxxxx9247313 sshd[14568]: Invalid user r00t from 14.29.189.236
Aug 16 11:08:47 xxxxxxx9247313 sshd[1........
------------------------------
2020-08-17 01:24:19
5.188.84.115 attackspambots
0,22-01/03 [bc01/m13] PostRequest-Spammer scoring: maputo01_x2b
2020-08-17 01:27:56
120.53.103.84 attackbotsspam
$f2bV_matches
2020-08-17 01:58:46
101.206.238.182 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-08-17 01:33:46
106.12.8.39 attackbots
Aug 16 16:36:45 h1745522 sshd[16902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.8.39  user=root
Aug 16 16:36:46 h1745522 sshd[16902]: Failed password for root from 106.12.8.39 port 48400 ssh2
Aug 16 16:40:46 h1745522 sshd[17206]: Invalid user deploy from 106.12.8.39 port 51024
Aug 16 16:40:46 h1745522 sshd[17206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.8.39
Aug 16 16:40:46 h1745522 sshd[17206]: Invalid user deploy from 106.12.8.39 port 51024
Aug 16 16:40:48 h1745522 sshd[17206]: Failed password for invalid user deploy from 106.12.8.39 port 51024 ssh2
Aug 16 16:44:44 h1745522 sshd[17436]: Invalid user server from 106.12.8.39 port 53658
Aug 16 16:44:44 h1745522 sshd[17436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.8.39
Aug 16 16:44:44 h1745522 sshd[17436]: Invalid user server from 106.12.8.39 port 53658
Aug 16 16:44:47 h1745522
...
2020-08-17 01:39:02
174.100.35.151 attackbotsspam
Aug 16 10:20:04 askasleikir sshd[107497]: Failed password for invalid user george from 174.100.35.151 port 34726 ssh2
Aug 16 10:26:49 askasleikir sshd[107520]: Failed password for invalid user deploy from 174.100.35.151 port 46494 ssh2
2020-08-17 01:21:23

Recently Reported IPs

61.29.175.194 116.90.104.126 194.121.80.136 211.121.163.117
94.129.141.203 177.198.96.37 192.24.200.240 183.157.170.29
49.144.100.238 23.80.199.250 118.241.95.217 179.250.91.253
89.183.98.122 60.31.55.57 220.115.54.234 191.145.174.231
34.169.68.66 102.57.8.89 191.139.4.242 62.94.56.66