Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: Vodafone Espana S.A.U.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbotsspam
Sep 24 21:33:47 abendstille sshd\[12749\]: Invalid user tunnel from 212.145.192.205
Sep 24 21:33:47 abendstille sshd\[12749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
Sep 24 21:33:49 abendstille sshd\[12749\]: Failed password for invalid user tunnel from 212.145.192.205 port 43440 ssh2
Sep 24 21:42:03 abendstille sshd\[21327\]: Invalid user ts from 212.145.192.205
Sep 24 21:42:03 abendstille sshd\[21327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
...
2020-09-25 03:56:54
attackbots
Sep 24 09:36:06 scw-focused-cartwright sshd[21306]: Failed password for root from 212.145.192.205 port 43690 ssh2
Sep 24 09:47:06 scw-focused-cartwright sshd[21520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
2020-09-24 19:46:15
attackspam
Sep 14 12:17:07 scw-focused-cartwright sshd[13757]: Failed password for root from 212.145.192.205 port 55424 ssh2
2020-09-14 21:01:42
attackbotsspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-09-14 12:53:56
attackbotsspam
Sep 13 22:51:16 fhem-rasp sshd[16861]: Failed password for root from 212.145.192.205 port 47216 ssh2
Sep 13 22:51:16 fhem-rasp sshd[16861]: Disconnected from authenticating user root 212.145.192.205 port 47216 [preauth]
...
2020-09-14 04:55:38
attackbotsspam
Aug 29 10:22:22 eventyay sshd[7703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
Aug 29 10:22:25 eventyay sshd[7703]: Failed password for invalid user riley from 212.145.192.205 port 35878 ssh2
Aug 29 10:29:54 eventyay sshd[8003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
...
2020-08-29 16:49:45
attackbots
Aug 23 11:17:01 mail sshd\[4317\]: Invalid user wyh from 212.145.192.205
Aug 23 11:17:01 mail sshd\[4317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
...
2020-08-24 01:02:19
attack
Automatic Fail2ban report - Trying login SSH
2020-08-20 07:35:16
attack
Aug  8 04:21:58 vps46666688 sshd[6575]: Failed password for root from 212.145.192.205 port 41026 ssh2
...
2020-08-08 15:54:46
attack
Brute-force attempt banned
2020-07-31 21:45:11
attackbotsspam
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205 
Failed password for invalid user nina from 212.145.192.205 port 36630 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
2020-07-25 06:31:37
attack
2020-07-22T21:17:14.235383sd-86998 sshd[37199]: Invalid user hsi from 212.145.192.205 port 44592
2020-07-22T21:17:14.240901sd-86998 sshd[37199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
2020-07-22T21:17:14.235383sd-86998 sshd[37199]: Invalid user hsi from 212.145.192.205 port 44592
2020-07-22T21:17:16.314240sd-86998 sshd[37199]: Failed password for invalid user hsi from 212.145.192.205 port 44592 ssh2
2020-07-22T21:23:44.032253sd-86998 sshd[37990]: Invalid user webftp from 212.145.192.205 port 46442
...
2020-07-23 04:16:39
attackspam
2020-07-17T14:30:40.266122abusebot-3.cloudsearch.cf sshd[27845]: Invalid user lulu from 212.145.192.205 port 60808
2020-07-17T14:30:40.273311abusebot-3.cloudsearch.cf sshd[27845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
2020-07-17T14:30:40.266122abusebot-3.cloudsearch.cf sshd[27845]: Invalid user lulu from 212.145.192.205 port 60808
2020-07-17T14:30:42.833282abusebot-3.cloudsearch.cf sshd[27845]: Failed password for invalid user lulu from 212.145.192.205 port 60808 ssh2
2020-07-17T14:37:32.687377abusebot-3.cloudsearch.cf sshd[28039]: Invalid user dcs from 212.145.192.205 port 50566
2020-07-17T14:37:32.693312abusebot-3.cloudsearch.cf sshd[28039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
2020-07-17T14:37:32.687377abusebot-3.cloudsearch.cf sshd[28039]: Invalid user dcs from 212.145.192.205 port 50566
2020-07-17T14:37:34.816343abusebot-3.cloudsearch.cf sshd[28039]:
...
2020-07-18 00:21:20
attackspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-16T09:31:05Z and 2020-07-16T10:32:03Z
2020-07-16 18:57:12
attackbots
Jul 14 19:15:32 amit sshd\[30401\]: Invalid user db from 212.145.192.205
Jul 14 19:15:32 amit sshd\[30401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
Jul 14 19:15:34 amit sshd\[30401\]: Failed password for invalid user db from 212.145.192.205 port 44454 ssh2
...
2020-07-15 02:19:16
attackspambots
Jul 13 11:08:04 gw1 sshd[31415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
Jul 13 11:08:06 gw1 sshd[31415]: Failed password for invalid user akt from 212.145.192.205 port 37294 ssh2
...
2020-07-13 17:15:12
attack
Jul  7 23:38:52 gestao sshd[17483]: Failed password for mail from 212.145.192.205 port 49200 ssh2
Jul  7 23:43:32 gestao sshd[17629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205 
Jul  7 23:43:33 gestao sshd[17629]: Failed password for invalid user dengxa from 212.145.192.205 port 47298 ssh2
...
2020-07-08 06:46:54
attack
Jun 23 19:21:20 firewall sshd[26523]: Failed password for invalid user ebs from 212.145.192.205 port 57098 ssh2
Jun 23 19:27:25 firewall sshd[26656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205  user=root
Jun 23 19:27:27 firewall sshd[26656]: Failed password for root from 212.145.192.205 port 57636 ssh2
...
2020-06-24 08:18:18
attack
Invalid user ym from 212.145.192.205 port 41642
2020-06-18 19:38:41
attackspam
Jun 13 15:18:34 vps647732 sshd[17287]: Failed password for root from 212.145.192.205 port 58480 ssh2
...
2020-06-13 22:08:28
attackspam
Jun 12 00:22:54 MainVPS sshd[13976]: Invalid user pass from 212.145.192.205 port 57404
Jun 12 00:22:54 MainVPS sshd[13976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
Jun 12 00:22:54 MainVPS sshd[13976]: Invalid user pass from 212.145.192.205 port 57404
Jun 12 00:22:56 MainVPS sshd[13976]: Failed password for invalid user pass from 212.145.192.205 port 57404 ssh2
Jun 12 00:27:07 MainVPS sshd[17452]: Invalid user admin from 212.145.192.205 port 47476
...
2020-06-12 07:59:02
attackbotsspam
Jun  9 00:28:16 jane sshd[32112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205 
Jun  9 00:28:18 jane sshd[32112]: Failed password for invalid user linux from 212.145.192.205 port 56958 ssh2
...
2020-06-09 08:10:25
attackbotsspam
Jun  2 06:10:38 scw-6657dc sshd[30408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205  user=root
Jun  2 06:10:38 scw-6657dc sshd[30408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205  user=root
Jun  2 06:10:41 scw-6657dc sshd[30408]: Failed password for root from 212.145.192.205 port 54592 ssh2
...
2020-06-02 14:45:57
attackspambots
May 27 12:43:47 sshgateway sshd\[3278\]: Invalid user lkihara from 212.145.192.205
May 27 12:43:47 sshgateway sshd\[3278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
May 27 12:43:49 sshgateway sshd\[3278\]: Failed password for invalid user lkihara from 212.145.192.205 port 46628 ssh2
2020-05-27 23:24:37
attackspam
May 25 19:51:40 minden010 sshd[24868]: Failed password for root from 212.145.192.205 port 59492 ssh2
May 25 19:58:37 minden010 sshd[27694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
May 25 19:58:39 minden010 sshd[27694]: Failed password for invalid user grogers from 212.145.192.205 port 41548 ssh2
...
2020-05-26 02:58:12
attackspambots
Failed password for invalid user ubuntu from 212.145.192.205 port 59908 ssh2
2020-05-25 19:32:54
attackbots
May 23 22:48:17 web1 sshd\[28221\]: Invalid user erx from 212.145.192.205
May 23 22:48:17 web1 sshd\[28221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
May 23 22:48:19 web1 sshd\[28221\]: Failed password for invalid user erx from 212.145.192.205 port 49680 ssh2
May 23 22:55:24 web1 sshd\[28793\]: Invalid user juc from 212.145.192.205
May 23 22:55:24 web1 sshd\[28793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
2020-05-24 17:14:02
attackspam
May 23 02:11:12 NPSTNNYC01T sshd[7774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
May 23 02:11:14 NPSTNNYC01T sshd[7774]: Failed password for invalid user shenhe from 212.145.192.205 port 56050 ssh2
May 23 02:14:07 NPSTNNYC01T sshd[10127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
...
2020-05-23 14:44:29
attackbotsspam
prod6
...
2020-05-11 03:32:51
attack
May  9 23:12:43 OPSO sshd\[25456\]: Invalid user uym from 212.145.192.205 port 59032
May  9 23:12:43 OPSO sshd\[25456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
May  9 23:12:45 OPSO sshd\[25456\]: Failed password for invalid user uym from 212.145.192.205 port 59032 ssh2
May  9 23:18:08 OPSO sshd\[26333\]: Invalid user lpy from 212.145.192.205 port 37758
May  9 23:18:08 OPSO sshd\[26333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
2020-05-10 05:31:44
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.145.192.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54011
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;212.145.192.205.		IN	A

;; AUTHORITY SECTION:
.			502	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030100 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 01 20:41:27 CST 2020
;; MSG SIZE  rcvd: 119
Host info
205.192.145.212.in-addr.arpa domain name pointer static-adsl-a-1-205.ipcom.comunitel.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
205.192.145.212.in-addr.arpa	name = static-adsl-a-1-205.ipcom.comunitel.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
171.244.43.52 attackbots
Mar 31 05:55:48 vpn01 sshd[25572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.43.52
Mar 31 05:55:50 vpn01 sshd[25572]: Failed password for invalid user io123 from 171.244.43.52 port 51528 ssh2
...
2020-03-31 12:15:10
101.51.46.14 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 31-03-2020 04:55:16.
2020-03-31 12:47:00
209.141.41.73 attack
Mar 30 18:26:15 hpm sshd\[6022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.41.73  user=root
Mar 30 18:26:17 hpm sshd\[6022\]: Failed password for root from 209.141.41.73 port 59686 ssh2
Mar 30 18:30:08 hpm sshd\[6319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.41.73  user=root
Mar 30 18:30:10 hpm sshd\[6319\]: Failed password for root from 209.141.41.73 port 45144 ssh2
Mar 30 18:33:55 hpm sshd\[6578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.41.73  user=root
2020-03-31 12:45:26
51.83.254.34 attackbotsspam
$f2bV_matches
2020-03-31 12:50:49
222.186.42.155 attackbots
2020-03-30T22:00:09.375978homeassistant sshd[6637]: Failed password for root from 222.186.42.155 port 62406 ssh2
2020-03-31T04:26:31.354243homeassistant sshd[4686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
...
2020-03-31 12:27:49
37.211.77.84 attackspam
2020-03-31T03:49:10.819569abusebot-3.cloudsearch.cf sshd[24811]: Invalid user nv from 37.211.77.84 port 58008
2020-03-31T03:49:10.827307abusebot-3.cloudsearch.cf sshd[24811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.211.77.84
2020-03-31T03:49:10.819569abusebot-3.cloudsearch.cf sshd[24811]: Invalid user nv from 37.211.77.84 port 58008
2020-03-31T03:49:13.139937abusebot-3.cloudsearch.cf sshd[24811]: Failed password for invalid user nv from 37.211.77.84 port 58008 ssh2
2020-03-31T03:55:49.845717abusebot-3.cloudsearch.cf sshd[25248]: Invalid user ud from 37.211.77.84 port 42154
2020-03-31T03:55:49.851164abusebot-3.cloudsearch.cf sshd[25248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.211.77.84
2020-03-31T03:55:49.845717abusebot-3.cloudsearch.cf sshd[25248]: Invalid user ud from 37.211.77.84 port 42154
2020-03-31T03:55:51.938596abusebot-3.cloudsearch.cf sshd[25248]: Failed password for invalid 
...
2020-03-31 12:14:43
140.238.145.45 attackbotsspam
(sshd) Failed SSH login from 140.238.145.45 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 31 05:55:42 ubnt-55d23 sshd[25426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.145.45  user=root
Mar 31 05:55:45 ubnt-55d23 sshd[25426]: Failed password for root from 140.238.145.45 port 45360 ssh2
2020-03-31 12:17:34
37.59.58.142 attackbots
Mar 31 05:55:49 plex sshd[27697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.58.142  user=root
Mar 31 05:55:51 plex sshd[27697]: Failed password for root from 37.59.58.142 port 45850 ssh2
2020-03-31 12:15:43
116.237.76.200 attack
Mar 31 00:49:20 ws19vmsma01 sshd[236931]: Failed password for root from 116.237.76.200 port 42470 ssh2
Mar 31 00:55:18 ws19vmsma01 sshd[244051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.237.76.200
...
2020-03-31 12:42:10
133.130.117.41 attackspambots
Mar 31 06:21:24 vps647732 sshd[11397]: Failed password for root from 133.130.117.41 port 39996 ssh2
...
2020-03-31 12:28:16
174.138.58.149 attack
Mar 31 06:07:57 host01 sshd[21693]: Failed password for root from 174.138.58.149 port 55790 ssh2
Mar 31 06:12:08 host01 sshd[22450]: Failed password for root from 174.138.58.149 port 40596 ssh2
...
2020-03-31 12:22:06
5.157.15.158 attack
Unauthorized access detected from black listed ip!
2020-03-31 12:21:34
175.236.13.20 attackspambots
port
2020-03-31 12:13:10
183.88.11.150 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 31-03-2020 04:55:19.
2020-03-31 12:39:49
172.93.121.70 attackspam
Mar 31 05:53:03 OPSO sshd\[10049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.93.121.70  user=root
Mar 31 05:53:06 OPSO sshd\[10049\]: Failed password for root from 172.93.121.70 port 57426 ssh2
Mar 31 05:56:00 OPSO sshd\[10688\]: Invalid user test from 172.93.121.70 port 59220
Mar 31 05:56:00 OPSO sshd\[10688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.93.121.70
Mar 31 05:56:02 OPSO sshd\[10688\]: Failed password for invalid user test from 172.93.121.70 port 59220 ssh2
2020-03-31 12:08:23

Recently Reported IPs

114.249.66.73 130.227.168.241 61.183.143.35 222.180.129.208
51.89.213.82 183.214.46.150 91.109.215.119 39.101.80.19
42.118.218.224 200.223.89.123 33.119.238.23 84.186.52.134
206.119.238.159 209.54.97.245 202.84.11.192 48.130.55.161
18.190.5.126 186.14.79.15 95.192.56.51 71.50.14.106