Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Novosibirsk

Region: Novosibirsk

Country: Russia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '195.208.144.0 - 195.208.159.255'

% Abuse contact for '195.208.144.0 - 195.208.159.255' is 'abuse@mega-com.ru'

inetnum:        195.208.144.0 - 195.208.159.255
netname:        MEGACOM-NET
descr:          MEGACOM-IT LLC
org:            ORG-MGIT1-RIPE
country:        RU
admin-c:        OS1064-RIPE
tech-c:         OS1064-RIPE
mnt-routes:     AS44587-MNT
status:         ASSIGNED PA
mnt-by:         ROSNIIROS-MNT
created:        1970-01-01T00:00:00Z
last-modified:  2020-04-15T06:17:16Z
source:         RIPE

organisation:   ORG-MGIT1-RIPE
org-name:       MEGACOM-IT LLC
country:        RU
org-type:       OTHER
address:        Prospekt Dzerzhinsky, 20, the 3rd-floor, room 18
address:        630015 Novosibirsk
address:        Russian Federation
reg-nr:         1185476074046
abuse-c:        AR21606-RIPE
admin-c:        OS1064-RIPE
tech-c:         OS1064-RIPE
mnt-ref:        ROSNIIROS-MNT
mnt-ref:        COPROSYS-MNT
mnt-by:         AS44587-MNT
created:        2019-01-16T15:58:47Z
last-modified:  2026-04-29T06:24:57Z
source:         RIPE # Filtered

person:         Oleg Shurpikov
address:        Prospekt Dzerzhinsky, 20, the 3rd-floor, room 18
address:        630015 Novosibirsk
address:        Russian Federation
phone:          +7 383 2003500
nic-hdl:        OS1064-RIPE
mnt-by:         AS44587-MNT
created:        2008-02-05T16:43:16Z
last-modified:  2022-01-11T11:39:50Z
source:         RIPE # Filtered

% Information related to '195.208.128.0/19AS44587'

route:          195.208.128.0/19
descr:          MEGACOM route origin
descr:          Novosibirsk, Russia
origin:         AS44587
mnt-by:         AS44587-MNT
created:        2020-04-20T16:41:23Z
last-modified:  2020-04-20T16:41:23Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.122 (SHETLAND)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.208.158.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22911
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.208.158.136.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050301 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 04 11:05:53 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 136.158.208.195.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.158.208.195.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.145.201.57 attack
Unauthorized connection attempt from IP address 49.145.201.57 on Port 445(SMB)
2020-02-28 08:46:09
223.8.192.196 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-28 08:34:22
82.64.129.178 attack
SSH invalid-user multiple login try
2020-02-28 08:12:59
69.58.178.59 attackbots
Automatic report - Banned IP Access
2020-02-28 08:36:24
92.63.194.25 attackspam
Feb 27 08:44:00 XXX sshd[47752]: Invalid user Administrator from 92.63.194.25 port 46793
2020-02-28 08:24:17
222.186.173.142 attackbotsspam
Feb 28 02:44:43 ift sshd\[28084\]: Failed password for root from 222.186.173.142 port 59612 ssh2Feb 28 02:44:46 ift sshd\[28084\]: Failed password for root from 222.186.173.142 port 59612 ssh2Feb 28 02:44:49 ift sshd\[28084\]: Failed password for root from 222.186.173.142 port 59612 ssh2Feb 28 02:44:53 ift sshd\[28084\]: Failed password for root from 222.186.173.142 port 59612 ssh2Feb 28 02:44:56 ift sshd\[28084\]: Failed password for root from 222.186.173.142 port 59612 ssh2
...
2020-02-28 08:51:25
106.75.100.91 attackspambots
Feb 28 01:13:56 vps647732 sshd[12258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.100.91
Feb 28 01:13:58 vps647732 sshd[12258]: Failed password for invalid user jstorm from 106.75.100.91 port 46684 ssh2
...
2020-02-28 08:15:16
223.95.102.143 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-28 08:30:03
51.77.144.37 attackspam
$f2bV_matches
2020-02-28 08:24:36
190.180.63.229 attackbots
Feb 28 00:18:47 sigma sshd\[4446\]: Invalid user www from 190.180.63.229Feb 28 00:18:49 sigma sshd\[4446\]: Failed password for invalid user www from 190.180.63.229 port 41072 ssh2
...
2020-02-28 08:27:29
167.86.124.67 attack
v+ssh-bruteforce
2020-02-28 08:26:03
54.36.150.136 attackbots
ece-2 : Block REQUEST_URI=>/calendrier/detailevenement/236/10,11,19,23/cso-plessis-bouchard(,)
2020-02-28 08:53:53
106.54.242.120 attack
web-1 [ssh] SSH Attack
2020-02-28 08:22:34
180.171.71.167 attack
scan z
2020-02-28 08:55:29
103.123.65.35 attackbots
Invalid user email from 103.123.65.35 port 47126
2020-02-28 08:42:32

Recently Reported IPs

45.139.122.80 2606:4700:10::6816:4555 2606:4700:10::ac43:2131 250.20.72.238
196.9.199.50 218.21.188.159 171.107.226.233 115.209.84.30
197.64.126.82 201.57.184.144 111.110.53.65 255.184.215.255
82.206.254.139 185.247.137.37 2606:4700:10::6814:5381 110.78.158.133
2606:4700:10::6816:2467 2606:4700:10::ac43:2715 63.179.243.148 38.71.117.123