Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kyrgyzstan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
213.145.149.226 attack
proto=tcp  .  spt=37619  .  dpt=25  .     (listed on Blocklist de  Jul 23)     (1026)
2019-07-24 09:22:43
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.145.149.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48334
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.145.149.78.			IN	A

;; AUTHORITY SECTION:
.			397	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 01:38:23 CST 2022
;; MSG SIZE  rcvd: 107
Host info
78.149.145.213.in-addr.arpa domain name pointer 213-145-149-78.static.ktnet.kg.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
78.149.145.213.in-addr.arpa	name = 213-145-149-78.static.ktnet.kg.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.5.249.209 attackspam
Unauthorised access (Mar 29) SRC=117.5.249.209 LEN=52 TTL=109 ID=20603 DF TCP DPT=1433 WINDOW=8192 SYN
2020-03-30 00:01:44
110.173.178.50 attackspambots
Unauthorized connection attempt from IP address 110.173.178.50 on Port 445(SMB)
2020-03-30 00:06:17
187.201.35.157 attack
Automatic report - Port Scan Attack
2020-03-30 00:15:34
52.73.160.195 attackbotsspam
Attempted to connect 6 times to port 7116 TCP
2020-03-30 00:23:50
220.142.165.223 attack
Unauthorized connection attempt from IP address 220.142.165.223 on Port 445(SMB)
2020-03-30 00:18:46
182.30.130.112 attackbots
1585490869 - 03/29/2020 16:07:49 Host: 182.30.130.112/182.30.130.112 Port: 445 TCP Blocked
2020-03-30 00:34:46
110.39.104.198 attack
Unauthorized connection attempt from IP address 110.39.104.198 on Port 445(SMB)
2020-03-30 00:17:53
116.12.200.194 attackspambots
Unauthorized connection attempt from IP address 116.12.200.194 on Port 445(SMB)
2020-03-30 00:03:29
183.16.100.208 attack
Mar 29 14:45:42 debian-2gb-nbg1-2 kernel: \[7745004.288366\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=183.16.100.208 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=114 ID=26746 DF PROTO=TCP SPT=63597 DPT=4899 WINDOW=8192 RES=0x00 SYN URGP=0
2020-03-30 00:37:42
121.204.166.240 attackspam
Mar 29 09:43:00 firewall sshd[31299]: Invalid user gjp from 121.204.166.240
Mar 29 09:43:02 firewall sshd[31299]: Failed password for invalid user gjp from 121.204.166.240 port 57343 ssh2
Mar 29 09:46:09 firewall sshd[31490]: Invalid user ioana from 121.204.166.240
...
2020-03-29 23:58:11
213.190.48.182 attackspam
Unauthorized connection attempt from IP address 213.190.48.182 on Port 445(SMB)
2020-03-30 00:40:50
177.128.70.240 attack
fail2ban
2020-03-30 00:00:47
82.76.19.190 attackbots
trying to access non-authorized port
2020-03-30 00:41:08
134.209.228.253 attackspambots
Mar 29 06:22:05 mockhub sshd[7828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253
Mar 29 06:22:07 mockhub sshd[7828]: Failed password for invalid user wangsying from 134.209.228.253 port 58040 ssh2
...
2020-03-30 00:31:47
162.243.233.102 attackbots
(sshd) Failed SSH login from 162.243.233.102 (US/United States/-): 5 in the last 3600 secs
2020-03-30 00:20:26

Recently Reported IPs

213.144.49.50 213.146.191.132 213.146.171.95 213.147.98.221
213.146.167.10 213.148.65.207 213.149.103.194 213.149.105.120
213.147.98.223 213.149.141.79 213.149.17.166 213.149.174.40
213.147.98.226 213.148.65.241 213.149.27.71 213.149.230.164
213.149.255.232 213.149.26.39 213.149.31.237 213.149.245.114