Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.58.20.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19096
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.58.20.53.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120801 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 03:30:44 CST 2024
;; MSG SIZE  rcvd: 104
Host info
Host 53.20.58.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.20.58.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.194.24.135 attackbots
Automatic report - Port Scan Attack
2019-08-17 06:05:39
124.74.110.230 attackbotsspam
Aug 16 12:03:24 lcprod sshd\[19893\]: Invalid user tir from 124.74.110.230
Aug 16 12:03:24 lcprod sshd\[19893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.110.230
Aug 16 12:03:26 lcprod sshd\[19893\]: Failed password for invalid user tir from 124.74.110.230 port 2298 ssh2
Aug 16 12:08:24 lcprod sshd\[20314\]: Invalid user Access from 124.74.110.230
Aug 16 12:08:24 lcprod sshd\[20314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.110.230
2019-08-17 06:11:56
51.68.251.221 attackspam
fail2ban honeypot
2019-08-17 03:58:50
87.196.188.211 attack
Aug 16 10:00:11 web9 sshd\[4657\]: Invalid user flo from 87.196.188.211
Aug 16 10:00:11 web9 sshd\[4657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.196.188.211
Aug 16 10:00:13 web9 sshd\[4657\]: Failed password for invalid user flo from 87.196.188.211 port 57972 ssh2
Aug 16 10:04:56 web9 sshd\[5648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.196.188.211  user=root
Aug 16 10:04:57 web9 sshd\[5648\]: Failed password for root from 87.196.188.211 port 53543 ssh2
2019-08-17 05:43:24
159.203.66.238 attackbots
Aug 16 14:46:41 aat-srv002 sshd[25559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.66.238
Aug 16 14:46:43 aat-srv002 sshd[25559]: Failed password for invalid user admissions from 159.203.66.238 port 51212 ssh2
Aug 16 14:50:54 aat-srv002 sshd[25706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.66.238
Aug 16 14:50:56 aat-srv002 sshd[25706]: Failed password for invalid user p0stgres from 159.203.66.238 port 41658 ssh2
...
2019-08-17 03:59:24
180.250.113.117 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-16 19:53:01,862 INFO [amun_request_handler] PortScan Detected on Port: 445 (180.250.113.117)
2019-08-17 06:02:23
104.248.176.22 attackspam
Aug 16 11:43:17 lcdev sshd\[28684\]: Invalid user shree from 104.248.176.22
Aug 16 11:43:17 lcdev sshd\[28684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.176.22
Aug 16 11:43:20 lcdev sshd\[28684\]: Failed password for invalid user shree from 104.248.176.22 port 46716 ssh2
Aug 16 11:49:10 lcdev sshd\[29147\]: Invalid user yasmine from 104.248.176.22
Aug 16 11:49:10 lcdev sshd\[29147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.176.22
2019-08-17 05:49:43
185.2.140.155 attackspambots
Aug 16 10:00:19 lcdev sshd\[19228\]: Invalid user lsx from 185.2.140.155
Aug 16 10:00:19 lcdev sshd\[19228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.2.140.155
Aug 16 10:00:21 lcdev sshd\[19228\]: Failed password for invalid user lsx from 185.2.140.155 port 54298 ssh2
Aug 16 10:04:48 lcdev sshd\[19602\]: Invalid user pck from 185.2.140.155
Aug 16 10:04:48 lcdev sshd\[19602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.2.140.155
2019-08-17 05:45:51
119.196.83.14 attackbotsspam
Aug 16 21:21:06 XXX sshd[25413]: Invalid user ofsaa from 119.196.83.14 port 43050
2019-08-17 04:03:55
179.232.1.254 attackspambots
Aug 16 09:56:57 hiderm sshd\[2050\]: Invalid user rolo from 179.232.1.254
Aug 16 09:56:57 hiderm sshd\[2050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.254
Aug 16 09:56:58 hiderm sshd\[2050\]: Failed password for invalid user rolo from 179.232.1.254 port 57045 ssh2
Aug 16 10:04:59 hiderm sshd\[2794\]: Invalid user matthieu from 179.232.1.254
Aug 16 10:04:59 hiderm sshd\[2794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.254
2019-08-17 05:40:42
178.62.6.225 attackbotsspam
2019-08-16T21:48:44.981080abusebot-2.cloudsearch.cf sshd\[5470\]: Invalid user nagios from 178.62.6.225 port 38014
2019-08-17 06:09:17
68.183.237.207 attackbots
Automated report - ssh fail2ban:
Aug 16 21:27:24 authentication failure 
Aug 16 21:27:26 wrong password, user=Vision, port=50646, ssh2
2019-08-17 04:02:30
91.121.211.34 attack
Aug 16 10:00:52 tdfoods sshd\[8359\]: Invalid user jeronimo from 91.121.211.34
Aug 16 10:00:52 tdfoods sshd\[8359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns337826.ip-91-121-211.eu
Aug 16 10:00:55 tdfoods sshd\[8359\]: Failed password for invalid user jeronimo from 91.121.211.34 port 33468 ssh2
Aug 16 10:04:59 tdfoods sshd\[8803\]: Invalid user z from 91.121.211.34
Aug 16 10:04:59 tdfoods sshd\[8803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns337826.ip-91-121-211.eu
2019-08-17 05:41:06
178.128.201.224 attackbotsspam
Aug 12 10:11:17 *** sshd[2728]: Failed password for invalid user agustina from 178.128.201.224 port 36782 ssh2
Aug 12 10:19:37 *** sshd[2810]: Failed password for invalid user valefor from 178.128.201.224 port 52094 ssh2
Aug 16 17:48:39 *** sshd[25470]: Failed password for invalid user cod from 178.128.201.224 port 35190 ssh2
Aug 16 17:53:41 *** sshd[25533]: Failed password for invalid user es from 178.128.201.224 port 54144 ssh2
2019-08-17 05:59:38
197.95.193.173 attack
Aug 16 11:06:54 h2022099 sshd[10865]: reveeclipse mapping checking getaddrinfo for 197-95-193-173.ftth.mweb.co.za [197.95.193.173] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 16 11:06:54 h2022099 sshd[10865]: Invalid user lovemba from 197.95.193.173
Aug 16 11:06:54 h2022099 sshd[10865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.95.193.173 
Aug 16 11:06:57 h2022099 sshd[10865]: Failed password for invalid user lovemba from 197.95.193.173 port 35950 ssh2
Aug 16 11:06:57 h2022099 sshd[10865]: Received disconnect from 197.95.193.173: 11: Bye Bye [preauth]
Aug 16 12:02:19 h2022099 sshd[21036]: reveeclipse mapping checking getaddrinfo for 197-95-193-173.ftth.mweb.co.za [197.95.193.173] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 16 12:02:19 h2022099 sshd[21036]: Invalid user postmaster from 197.95.193.173
Aug 16 12:02:19 h2022099 sshd[21036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.9........
-------------------------------
2019-08-17 03:59:09

Recently Reported IPs

131.11.137.3 139.127.7.224 210.209.178.130 255.168.195.6
211.150.179.111 170.71.135.234 243.220.207.56 66.53.100.71
94.21.64.204 247.226.55.116 71.68.50.226 40.181.185.253
161.115.175.72 138.2.198.22 42.109.216.183 34.159.227.15
32.58.71.30 142.180.60.57 152.22.44.204 248.32.226.184