Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Zirndorf

Region: Bavaria

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.34.95.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55846
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.34.95.145.			IN	A

;; AUTHORITY SECTION:
.			292	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022041001 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 11 09:54:07 CST 2022
;; MSG SIZE  rcvd: 106
Host info
145.95.34.212.in-addr.arpa domain name pointer rev-212.34.95.145.rev.f-i-ts.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.95.34.212.in-addr.arpa	name = rev-212.34.95.145.rev.f-i-ts.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
144.217.85.55 attack
fraudulent SSH attempt
2020-02-08 06:11:54
184.105.247.251 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-08 06:04:29
190.206.6.112 attack
Unauthorized connection attempt from IP address 190.206.6.112 on Port 445(SMB)
2020-02-08 06:07:21
61.231.64.211 attackspambots
Lines containing failures of 61.231.64.211
Feb  5 20:27:26 ariston sshd[10626]: Invalid user lj from 61.231.64.211 port 58448
Feb  5 20:27:26 ariston sshd[10626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.231.64.211
Feb  5 20:27:28 ariston sshd[10626]: Failed password for invalid user lj from 61.231.64.211 port 58448 ssh2
Feb  5 20:27:29 ariston sshd[10626]: Received disconnect from 61.231.64.211 port 58448:11: Bye Bye [preauth]
Feb  5 20:27:29 ariston sshd[10626]: Disconnected from invalid user lj 61.231.64.211 port 58448 [preauth]
Feb  5 20:30:48 ariston sshd[11077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.231.64.211  user=r.r
Feb  5 20:30:51 ariston sshd[11077]: Failed password for r.r from 61.231.64.211 port 34594 ssh2
Feb  5 20:30:53 ariston sshd[11077]: Received disconnect from 61.231.64.211 port 34594:11: Bye Bye [preauth]
Feb  5 20:30:53 ariston sshd[11077]: Discon........
------------------------------
2020-02-08 06:06:14
175.141.131.132 attackbots
TCP port 3389: Scan and connection
2020-02-08 06:26:55
94.25.163.33 attack
Feb  7 21:04:06 gw1 sshd[6559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.25.163.33
Feb  7 21:04:08 gw1 sshd[6559]: Failed password for invalid user scc from 94.25.163.33 port 16524 ssh2
...
2020-02-08 05:54:56
147.139.135.52 attackspam
detected by Fail2Ban
2020-02-08 05:47:04
49.248.77.234 attackbotsspam
SSH login attempts.
2020-02-08 06:26:23
27.0.48.227 attackbots
Automatic report - Banned IP Access
2020-02-08 05:55:48
182.18.59.187 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-08 06:28:52
149.129.128.130 attackbots
ICMP MH Probe, Scan /Distributed -
2020-02-08 06:02:16
145.239.88.43 attackspam
Feb  7 20:36:31 gw1 sshd[5650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.88.43
Feb  7 20:36:33 gw1 sshd[5650]: Failed password for invalid user rjx from 145.239.88.43 port 49382 ssh2
...
2020-02-08 06:20:11
59.98.46.63 attackspambots
Unauthorized connection attempt from IP address 59.98.46.63 on Port 445(SMB)
2020-02-08 05:59:52
144.217.85.219 attackbotsspam
fraudulent SSH attempt
2020-02-08 06:16:38
177.66.30.48 attackbotsspam
Unauthorized connection attempt from IP address 177.66.30.48 on Port 445(SMB)
2020-02-08 05:57:42

Recently Reported IPs

18.204.78.224 147.209.116.137 95.238.16.189 78.203.71.116
163.152.164.0 197.160.51.71 188.62.77.184 175.39.169.23
21.200.28.173 67.149.47.171 35.52.142.240 12.183.62.106
232.94.160.39 91.158.159.140 41.136.35.95 81.55.151.151
17.252.14.169 140.26.7.129 251.61.212.54 28.138.111.37