Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bucharest

Region: Bucuresti

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.2.146.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22180
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.2.146.113.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 09 19:36:24 CST 2025
;; MSG SIZE  rcvd: 104
Host info
113.146.2.5.in-addr.arpa domain name pointer static-5-2-146-113.rdsnet.ro.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
113.146.2.5.in-addr.arpa	name = static-5-2-146-113.rdsnet.ro.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.119.160.106 attack
Nov  5 06:53:04 mc1 kernel: \[4219487.704993\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=45868 PROTO=TCP SPT=56856 DPT=46675 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  5 06:56:52 mc1 kernel: \[4219715.827329\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=39457 PROTO=TCP SPT=56856 DPT=47123 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  5 06:57:35 mc1 kernel: \[4219758.876975\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=1277 PROTO=TCP SPT=56856 DPT=46757 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-05 14:13:23
2.139.176.35 attack
$f2bV_matches
2019-11-05 14:11:36
182.76.165.66 attackspambots
Automatic report - Banned IP Access
2019-11-05 14:42:00
45.80.65.82 attackbotsspam
Nov  5 05:35:51 *** sshd[13764]: Invalid user marina from 45.80.65.82
2019-11-05 14:20:37
119.163.250.237 attackbots
Nov  5 05:53:12 localhost sshd\[16751\]: Invalid user pi from 119.163.250.237 port 28934
Nov  5 05:53:13 localhost sshd\[16751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.163.250.237
Nov  5 05:53:14 localhost sshd\[16751\]: Failed password for invalid user pi from 119.163.250.237 port 28934 ssh2
2019-11-05 14:04:26
85.214.230.190 attack
RDP Bruteforce
2019-11-05 13:55:42
159.65.174.81 attackbotsspam
2019-11-05T06:46:48.466105scmdmz1 sshd\[4249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.174.81  user=root
2019-11-05T06:46:50.086441scmdmz1 sshd\[4249\]: Failed password for root from 159.65.174.81 port 42764 ssh2
2019-11-05T06:52:06.031162scmdmz1 sshd\[4611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.174.81  user=root
...
2019-11-05 13:58:54
101.109.113.62 attack
Unauthorised access (Nov  5) SRC=101.109.113.62 LEN=52 TTL=114 ID=20100 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-05 14:29:36
95.31.48.12 attackspambots
Fail2Ban Ban Triggered
2019-11-05 14:20:13
27.111.43.195 attackbotsspam
27.111.43.195 - - \[05/Nov/2019:04:52:45 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
27.111.43.195 - - \[05/Nov/2019:04:52:47 +0000\] "POST /wp-login.php HTTP/1.1" 200 4219 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-05 14:19:12
58.37.225.126 attackbots
2019-11-05T06:38:58.075089tmaserv sshd\[22092\]: Invalid user bmp from 58.37.225.126 port 32509
2019-11-05T06:38:58.078619tmaserv sshd\[22092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.37.225.126
2019-11-05T06:39:00.290673tmaserv sshd\[22092\]: Failed password for invalid user bmp from 58.37.225.126 port 32509 ssh2
2019-11-05T06:43:18.261248tmaserv sshd\[22318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.37.225.126  user=root
2019-11-05T06:43:19.831633tmaserv sshd\[22318\]: Failed password for root from 58.37.225.126 port 51068 ssh2
2019-11-05T06:51:38.306294tmaserv sshd\[22737\]: Invalid user su from 58.37.225.126 port 27188
...
2019-11-05 14:12:18
117.103.2.226 attackbots
" "
2019-11-05 14:16:41
52.173.250.85 attackbots
Nov  5 06:53:21 MK-Soft-Root2 sshd[24296]: Failed password for root from 52.173.250.85 port 39626 ssh2
Nov  5 06:57:27 MK-Soft-Root2 sshd[25053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.173.250.85 
...
2019-11-05 14:17:51
207.46.13.107 attack
Automatic report - Banned IP Access
2019-11-05 14:41:10
188.191.233.106 attackbotsspam
Portscan detected
2019-11-05 14:21:59

Recently Reported IPs

173.239.39.142 4.203.28.111 160.220.212.195 167.107.0.8
185.25.30.35 13.244.7.197 128.142.227.150 52.48.158.111
143.78.221.101 173.210.144.139 46.219.108.2 139.114.92.122
145.15.93.191 249.211.152.141 97.206.124.42 162.221.253.64
230.62.203.182 51.87.186.201 30.135.210.237 81.10.37.193