Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.172.12.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2799
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.172.12.1.			IN	A

;; AUTHORITY SECTION:
.			571	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050601 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 07 09:40:45 CST 2023
;; MSG SIZE  rcvd: 105
Host info
1.12.172.136.in-addr.arpa domain name pointer ns2.dkrz.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.12.172.136.in-addr.arpa	name = ns2.dkrz.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
40.68.153.124 attack
2019-08-13T19:49:39.999375abusebot.cloudsearch.cf sshd\[7241\]: Invalid user ryan from 40.68.153.124 port 53642
2019-08-14 04:08:17
42.4.4.121 attackbots
Aug 13 20:19:19 root sshd[5390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.4.4.121 
Aug 13 20:19:21 root sshd[5390]: Failed password for invalid user dev from 42.4.4.121 port 59819 ssh2
Aug 13 20:25:58 root sshd[5425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.4.4.121 
...
2019-08-14 04:30:32
185.220.101.33 attack
Aug 13 20:56:51 mail sshd\[16449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.33  user=root
Aug 13 20:56:53 mail sshd\[16449\]: Failed password for root from 185.220.101.33 port 34817 ssh2
Aug 13 20:56:56 mail sshd\[16449\]: Failed password for root from 185.220.101.33 port 34817 ssh2
Aug 13 20:56:59 mail sshd\[16449\]: Failed password for root from 185.220.101.33 port 34817 ssh2
Aug 13 20:57:01 mail sshd\[16449\]: Failed password for root from 185.220.101.33 port 34817 ssh2
2019-08-14 04:22:31
222.255.146.19 attack
Aug 13 22:32:24 www1 sshd\[42909\]: Address 222.255.146.19 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Aug 13 22:32:24 www1 sshd\[42909\]: Invalid user tester from 222.255.146.19Aug 13 22:32:26 www1 sshd\[42909\]: Failed password for invalid user tester from 222.255.146.19 port 33204 ssh2Aug 13 22:37:53 www1 sshd\[43518\]: Address 222.255.146.19 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Aug 13 22:37:53 www1 sshd\[43518\]: Invalid user student6 from 222.255.146.19Aug 13 22:37:55 www1 sshd\[43518\]: Failed password for invalid user student6 from 222.255.146.19 port 54126 ssh2
...
2019-08-14 03:59:10
49.88.112.85 attackbots
failed root login
2019-08-14 04:12:34
94.191.39.20 attack
Aug 13 22:53:47 server sshd\[13011\]: User root from 94.191.39.20 not allowed because listed in DenyUsers
Aug 13 22:53:47 server sshd\[13011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.39.20  user=root
Aug 13 22:53:49 server sshd\[13011\]: Failed password for invalid user root from 94.191.39.20 port 35930 ssh2
Aug 13 22:59:39 server sshd\[26306\]: Invalid user butter from 94.191.39.20 port 55640
Aug 13 22:59:39 server sshd\[26306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.39.20
2019-08-14 04:00:01
125.209.124.155 attack
Jun 21 03:34:32 vtv3 sshd\[10438\]: Invalid user nagios from 125.209.124.155 port 38096
Jun 21 03:34:32 vtv3 sshd\[10438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.209.124.155
Jun 21 03:34:33 vtv3 sshd\[10438\]: Failed password for invalid user nagios from 125.209.124.155 port 38096 ssh2
Jun 21 03:38:55 vtv3 sshd\[12478\]: Invalid user fou from 125.209.124.155 port 49134
Jun 21 03:38:55 vtv3 sshd\[12478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.209.124.155
Jun 21 03:49:41 vtv3 sshd\[17418\]: Invalid user minecraft from 125.209.124.155 port 49128
Jun 21 03:49:41 vtv3 sshd\[17418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.209.124.155
Jun 21 03:49:42 vtv3 sshd\[17418\]: Failed password for invalid user minecraft from 125.209.124.155 port 49128 ssh2
Jun 21 03:51:33 vtv3 sshd\[18579\]: Invalid user shu from 125.209.124.155 port 34904
Jun 21 03:51:33 v
2019-08-14 04:22:56
138.68.57.194 attack
Aug 13 19:32:28 thevastnessof sshd[20924]: Failed password for invalid user antonio from 138.68.57.194 port 58836 ssh2
Aug 13 19:46:18 thevastnessof sshd[21117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.57.194
...
2019-08-14 03:55:06
51.68.123.37 attackbotsspam
Aug 13 21:28:50 nextcloud sshd\[2224\]: Invalid user sc from 51.68.123.37
Aug 13 21:28:50 nextcloud sshd\[2224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.123.37
Aug 13 21:28:52 nextcloud sshd\[2224\]: Failed password for invalid user sc from 51.68.123.37 port 55892 ssh2
...
2019-08-14 04:23:21
71.78.247.238 attackspam
Brute force RDP, port 3389
2019-08-14 04:34:48
152.136.76.134 attackspam
Aug 13 20:54:51 vps647732 sshd[31060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.76.134
Aug 13 20:54:53 vps647732 sshd[31060]: Failed password for invalid user uuuuu from 152.136.76.134 port 52596 ssh2
...
2019-08-14 04:03:58
78.85.38.101 attackspam
Mail sent to address hacked/leaked from Last.fm
2019-08-14 04:20:36
64.53.199.198 attackbotsspam
Aug 13 22:26:47 nginx sshd[66643]: error: maximum authentication attempts exceeded for invalid user admin from 64.53.199.198 port 53004 ssh2 [preauth]
Aug 13 22:26:47 nginx sshd[66643]: Disconnecting: Too many authentication failures [preauth]
2019-08-14 04:31:44
172.107.201.134 attackspambots
Reported by AbuseIPDB proxy server.
2019-08-14 04:38:06
150.140.189.33 attackspam
Aug 13 21:42:30 Proxmox sshd\[29702\]: User root from 150.140.189.33 not allowed because not listed in AllowUsers
Aug 13 21:42:30 Proxmox sshd\[29702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.140.189.33  user=root
Aug 13 21:42:33 Proxmox sshd\[29702\]: Failed password for invalid user root from 150.140.189.33 port 56266 ssh2
2019-08-14 04:34:22

Recently Reported IPs

137.28.5.193 140.116.20.139 140.116.19.65 140.116.82.231
202.127.28.199 209.213.80.9 134.76.33.42 140.116.60.129
140.116.71.130 36.80.86.153 212.219.101.43 140.116.20.243
140.110.117.51 83.212.248.30 81.180.65.229 140.134.236.150
140.116.82.174 165.112.140.124 140.116.80.215 49.207.180.41