Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.134.196.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46462
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.134.196.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 17:44:44 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 45.196.134.212.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.196.134.212.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.147.198.154 attack
Jun  6 05:04:18 Ubuntu-1404-trusty-64-minimal sshd\[18955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.147.198.154  user=root
Jun  6 05:04:21 Ubuntu-1404-trusty-64-minimal sshd\[18955\]: Failed password for root from 202.147.198.154 port 53736 ssh2
Jun  6 05:17:35 Ubuntu-1404-trusty-64-minimal sshd\[26114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.147.198.154  user=root
Jun  6 05:17:37 Ubuntu-1404-trusty-64-minimal sshd\[26114\]: Failed password for root from 202.147.198.154 port 41714 ssh2
Jun  6 05:32:13 Ubuntu-1404-trusty-64-minimal sshd\[1714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.147.198.154  user=root
2020-06-06 11:49:58
5.189.155.12 attack
Jun  5 02:35:27 cumulus sshd[12108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.189.155.12  user=r.r
Jun  5 02:35:29 cumulus sshd[12108]: Failed password for r.r from 5.189.155.12 port 41548 ssh2
Jun  5 02:35:29 cumulus sshd[12108]: Received disconnect from 5.189.155.12 port 41548:11: Bye Bye [preauth]
Jun  5 02:35:29 cumulus sshd[12108]: Disconnected from 5.189.155.12 port 41548 [preauth]
Jun  5 02:49:54 cumulus sshd[13559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.189.155.12  user=r.r
Jun  5 02:49:57 cumulus sshd[13559]: Failed password for r.r from 5.189.155.12 port 54230 ssh2
Jun  5 02:49:57 cumulus sshd[13559]: Received disconnect from 5.189.155.12 port 54230:11: Bye Bye [preauth]
Jun  5 02:49:57 cumulus sshd[13559]: Disconnected from 5.189.155.12 port 54230 [preauth]
Jun  5 02:53:14 cumulus sshd[13881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ........
-------------------------------
2020-06-06 11:57:21
187.188.90.141 attackspambots
Jun  5 23:29:22 sip sshd[555796]: Failed password for root from 187.188.90.141 port 55148 ssh2
Jun  5 23:32:55 sip sshd[555835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.90.141  user=root
Jun  5 23:32:56 sip sshd[555835]: Failed password for root from 187.188.90.141 port 57724 ssh2
...
2020-06-06 11:22:01
111.185.239.126 attack
Jun  5 22:22:34 debian-2gb-nbg1-2 kernel: \[13647306.014948\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=111.185.239.126 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=41 ID=4424 PROTO=TCP SPT=36368 DPT=85 WINDOW=23219 RES=0x00 SYN URGP=0
2020-06-06 12:01:36
46.218.7.227 attack
2020-06-06T02:53:55.812045vps773228.ovh.net sshd[21033]: Failed password for root from 46.218.7.227 port 45012 ssh2
2020-06-06T02:58:40.434565vps773228.ovh.net sshd[21100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.7.227  user=root
2020-06-06T02:58:42.777257vps773228.ovh.net sshd[21100]: Failed password for root from 46.218.7.227 port 46796 ssh2
2020-06-06T03:03:29.461263vps773228.ovh.net sshd[21187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.7.227  user=root
2020-06-06T03:03:31.467520vps773228.ovh.net sshd[21187]: Failed password for root from 46.218.7.227 port 48581 ssh2
...
2020-06-06 11:36:00
116.255.131.3 attackbots
2020-06-06T00:32:39.133473rocketchat.forhosting.nl sshd[13677]: Failed password for root from 116.255.131.3 port 52352 ssh2
2020-06-06T00:35:40.540509rocketchat.forhosting.nl sshd[13754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.255.131.3  user=root
2020-06-06T00:35:42.653220rocketchat.forhosting.nl sshd[13754]: Failed password for root from 116.255.131.3 port 43112 ssh2
...
2020-06-06 11:51:00
106.12.60.246 attackspambots
Jun  5 22:34:29 legacy sshd[7541]: Failed password for root from 106.12.60.246 port 49992 ssh2
Jun  5 22:38:50 legacy sshd[7651]: Failed password for root from 106.12.60.246 port 49620 ssh2
...
2020-06-06 11:51:45
106.75.16.62 attackspambots
SASL PLAIN auth failed: ruser=...
2020-06-06 11:56:32
178.217.168.84 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-06 11:34:58
218.29.219.36 attack
Jun  5 17:07:56 NPSTNNYC01T sshd[18413]: Failed password for root from 218.29.219.36 port 3688 ssh2
Jun  5 17:10:19 NPSTNNYC01T sshd[18563]: Failed password for root from 218.29.219.36 port 4264 ssh2
...
2020-06-06 11:20:29
222.186.42.137 attack
Jun  5 20:52:10 dignus sshd[27248]: Failed password for root from 222.186.42.137 port 24196 ssh2
Jun  5 20:52:12 dignus sshd[27259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
Jun  5 20:52:14 dignus sshd[27259]: Failed password for root from 222.186.42.137 port 10852 ssh2
Jun  5 20:52:21 dignus sshd[27272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
Jun  5 20:52:23 dignus sshd[27272]: Failed password for root from 222.186.42.137 port 32475 ssh2
...
2020-06-06 11:53:22
5.58.246.75 attack
(mod_security) mod_security (id:218500) triggered by 5.58.246.75 (UA/Ukraine/host-5-58-246-75.bitternet.ua): 5 in the last 3600 secs
2020-06-06 12:01:54
2.234.131.139 attackspambots
Unauthorized connection attempt detected from IP address 2.234.131.139 to port 88
2020-06-06 11:28:51
59.120.227.134 attackbots
Jun  6 03:52:24 DAAP sshd[9224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.227.134  user=root
Jun  6 03:52:26 DAAP sshd[9224]: Failed password for root from 59.120.227.134 port 50088 ssh2
Jun  6 03:58:29 DAAP sshd[9308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.227.134  user=root
Jun  6 03:58:30 DAAP sshd[9308]: Failed password for root from 59.120.227.134 port 56240 ssh2
Jun  6 04:02:23 DAAP sshd[9386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.227.134  user=root
Jun  6 04:02:25 DAAP sshd[9386]: Failed password for root from 59.120.227.134 port 42418 ssh2
...
2020-06-06 11:27:51
14.146.93.236 attackbots
Unauthorized connection attempt detected from IP address 14.146.93.236 to port 5555
2020-06-06 11:55:33

Recently Reported IPs

247.17.17.33 128.170.253.65 46.253.140.5 228.37.110.65
23.82.126.57 159.39.31.63 128.255.182.233 93.177.47.15
41.99.78.33 229.218.162.92 94.84.187.164 85.143.32.180
186.16.164.198 217.84.39.76 218.112.56.3 156.109.58.17
151.167.38.157 7.4.242.194 233.148.54.102 210.163.238.76