Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Helsingør

Region: Region Hovedstaden

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.10.0.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12905
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.10.0.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024112300 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 23 21:43:27 CST 2024
;; MSG SIZE  rcvd: 105
Host info
145.0.10.212.in-addr.arpa domain name pointer aslpe30.ip.stofa.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.0.10.212.in-addr.arpa	name = aslpe30.ip.stofa.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.6.166.209 attack
Unauthorized connection attempt detected from IP address 190.6.166.209 to port 23
2020-07-31 17:48:48
51.195.139.140 attackspambots
2020-07-31T04:33:41.670542morrigan.ad5gb.com sshd[240134]: Failed password for root from 51.195.139.140 port 39728 ssh2
2020-07-31T04:33:42.361504morrigan.ad5gb.com sshd[240134]: Disconnected from authenticating user root 51.195.139.140 port 39728 [preauth]
2020-07-31 17:41:55
101.89.192.64 attackspam
 TCP (SYN) 101.89.192.64:45476 -> port 17919, len 44
2020-07-31 17:46:29
212.28.237.138 attackbotsspam
Port Scan
...
2020-07-31 17:52:34
104.131.249.57 attack
<6 unauthorized SSH connections
2020-07-31 18:09:12
104.236.151.120 attackspam
Jul 31 16:12:45 webhost01 sshd[23876]: Failed password for root from 104.236.151.120 port 46892 ssh2
...
2020-07-31 17:29:30
49.88.112.111 attackspam
2020-07-31T05:42:40.592303abusebot-3.cloudsearch.cf sshd[21407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
2020-07-31T05:42:42.721912abusebot-3.cloudsearch.cf sshd[21407]: Failed password for root from 49.88.112.111 port 26633 ssh2
2020-07-31T05:42:44.982019abusebot-3.cloudsearch.cf sshd[21407]: Failed password for root from 49.88.112.111 port 26633 ssh2
2020-07-31T05:42:40.592303abusebot-3.cloudsearch.cf sshd[21407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
2020-07-31T05:42:42.721912abusebot-3.cloudsearch.cf sshd[21407]: Failed password for root from 49.88.112.111 port 26633 ssh2
2020-07-31T05:42:44.982019abusebot-3.cloudsearch.cf sshd[21407]: Failed password for root from 49.88.112.111 port 26633 ssh2
2020-07-31T05:42:40.592303abusebot-3.cloudsearch.cf sshd[21407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse
...
2020-07-31 17:43:15
193.112.19.133 attackbotsspam
Invalid user zhanghaoli from 193.112.19.133 port 39650
2020-07-31 17:43:36
80.151.235.172 attack
Invalid user griffin from 80.151.235.172 port 58342
2020-07-31 17:59:54
123.57.84.251 attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-31T03:44:09Z and 2020-07-31T03:49:25Z
2020-07-31 18:01:25
181.49.118.185 attackspambots
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-07-31 18:08:01
140.143.204.66 attackbots
Jul 31 11:31:35 h2829583 sshd[13952]: Failed password for root from 140.143.204.66 port 41334 ssh2
2020-07-31 17:49:35
149.56.13.111 attack
$f2bV_matches
2020-07-31 18:08:19
27.221.97.3 attackspambots
Invalid user saltops from 27.221.97.3 port 42322
2020-07-31 17:47:02
66.249.66.70 attackspambots
Automatic report - Banned IP Access
2020-07-31 18:07:41

Recently Reported IPs

140.182.52.120 216.58.181.57 180.195.168.232 20.227.64.26
43.85.106.122 172.10.42.175 135.44.97.119 136.135.208.189
172.254.52.114 157.105.108.224 136.175.243.156 179.43.163.193
179.43.163.232 43.13.227.28 124.224.83.75 208.155.132.21
192.168.254.65 45.142.202.0 192.168.100.221 7.2.240.152