Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Soltau

Region: Niedersachsen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.45.106.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6086
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.45.106.197.			IN	A

;; AUTHORITY SECTION:
.			197	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023011200 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 12 17:42:37 CST 2023
;; MSG SIZE  rcvd: 105
Host info
197.106.45.5.in-addr.arpa domain name pointer NurembergTor52.quetzalcoatl-relays.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
197.106.45.5.in-addr.arpa	name = NurembergTor52.quetzalcoatl-relays.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.6.161.77 attackbots
Mar 27 18:27:51 srv206 sshd[27192]: Invalid user xx from 188.6.161.77
Mar 27 18:27:51 srv206 sshd[27192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=dslbc06a14d.fixip.t-online.hu
Mar 27 18:27:51 srv206 sshd[27192]: Invalid user xx from 188.6.161.77
Mar 27 18:27:53 srv206 sshd[27192]: Failed password for invalid user xx from 188.6.161.77 port 35490 ssh2
...
2020-03-28 02:00:16
106.124.137.108 attackbots
Invalid user bed from 106.124.137.108 port 34314
2020-03-28 01:55:40
2.95.194.211 attackbots
Mar 27 15:08:44 vps647732 sshd[22540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.95.194.211
Mar 27 15:08:46 vps647732 sshd[22540]: Failed password for invalid user trm from 2.95.194.211 port 50776 ssh2
...
2020-03-28 01:37:09
163.172.113.19 attackbotsspam
Mar 27 18:40:53 serwer sshd\[26595\]: Invalid user roy from 163.172.113.19 port 39928
Mar 27 18:40:53 serwer sshd\[26595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.113.19
Mar 27 18:40:55 serwer sshd\[26595\]: Failed password for invalid user roy from 163.172.113.19 port 39928 ssh2
...
2020-03-28 01:41:54
92.63.194.105 attackbotsspam
2020-03-27T18:34:27.755885  sshd[9506]: Invalid user admin from 92.63.194.105 port 43337
2020-03-27T18:34:27.770012  sshd[9506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.105
2020-03-27T18:34:27.755885  sshd[9506]: Invalid user admin from 92.63.194.105 port 43337
2020-03-27T18:34:29.708498  sshd[9506]: Failed password for invalid user admin from 92.63.194.105 port 43337 ssh2
...
2020-03-28 02:01:51
209.17.96.122 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 57a4fe53398dec19 | WAF_Rule_ID: ipr24 | WAF_Kind: firewall | CF_Action: challenge | Country: US | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: gh-card.skk.moe | User-Agent: Mozilla/5.0 (compatible; Nimbostratus-Bot/v1.3.2; http://cloudsystemnetworks.com) | CF_DC: ATL. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2020-03-28 01:28:32
200.89.175.97 attackspam
Invalid user qff from 200.89.175.97 port 40578
2020-03-28 02:06:15
83.149.46.198 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 27-03-2020 12:30:13.
2020-03-28 01:59:13
173.236.149.184 attack
173.236.149.184 - - [27/Mar/2020:17:35:26 +0100] "GET /wp-login.php HTTP/1.1" 200 6482 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
173.236.149.184 - - [27/Mar/2020:17:35:27 +0100] "POST /wp-login.php HTTP/1.1" 200 7262 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
173.236.149.184 - - [27/Mar/2020:17:35:28 +0100] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-28 01:25:16
198.108.67.54 attackbots
firewall-block, port(s): 12200/tcp
2020-03-28 01:35:18
188.92.77.235 attack
firewall-block, port(s): 1900/udp
2020-03-28 01:53:23
49.51.164.212 attackspam
Invalid user rwx from 49.51.164.212 port 47054
2020-03-28 01:39:42
106.12.96.23 attackbots
Mar 27 13:42:27 mout sshd[26377]: Invalid user wps from 106.12.96.23 port 44352
2020-03-28 01:58:06
14.171.97.204 attack
Unauthorized connection attempt from IP address 14.171.97.204 on Port 445(SMB)
2020-03-28 01:22:09
181.222.35.194 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 27-03-2020 12:30:10.
2020-03-28 02:04:03

Recently Reported IPs

118.233.54.139 5.89.65.132 137.226.0.44 137.226.0.197
20.210.113.32 117.6.252.216 5.135.53.196 135.12.201.26
157.230.47.75 198.12.121.207 185.243.216.91 103.146.203.217
163.116.248.46 92.222.216.41 61.220.170.133 75.89.101.60
5.45.102.68 137.226.1.23 143.198.187.65 185.29.121.141