Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.205.209.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61568
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.205.209.157.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:41:15 CST 2025
;; MSG SIZE  rcvd: 106
Host info
157.209.205.2.in-addr.arpa domain name pointer dslb-002-205-209-157.002.205.pools.vodafone-ip.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
157.209.205.2.in-addr.arpa	name = dslb-002-205-209-157.002.205.pools.vodafone-ip.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
206.189.18.40 attackspam
Mar 29 13:56:07 game-panel sshd[12655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.18.40
Mar 29 13:56:09 game-panel sshd[12655]: Failed password for invalid user keb from 206.189.18.40 port 50604 ssh2
Mar 29 14:02:47 game-panel sshd[12967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.18.40
2020-03-30 00:15:05
117.242.36.34 attackbots
Unauthorized connection attempt from IP address 117.242.36.34 on Port 445(SMB)
2020-03-30 00:13:58
45.133.99.3 attackbots
2020-03-29 17:55:39 dovecot_login authenticator failed for \(\[45.133.99.3\]\) \[45.133.99.3\]: 535 Incorrect authentication data \(set_id=admin222@no-server.de\)
2020-03-29 17:55:48 dovecot_login authenticator failed for \(\[45.133.99.3\]\) \[45.133.99.3\]: 535 Incorrect authentication data
2020-03-29 17:55:58 dovecot_login authenticator failed for \(\[45.133.99.3\]\) \[45.133.99.3\]: 535 Incorrect authentication data
2020-03-29 17:56:04 dovecot_login authenticator failed for \(\[45.133.99.3\]\) \[45.133.99.3\]: 535 Incorrect authentication data
2020-03-29 17:56:17 dovecot_login authenticator failed for \(\[45.133.99.3\]\) \[45.133.99.3\]: 535 Incorrect authentication data
...
2020-03-30 00:04:39
125.141.139.9 attack
(sshd) Failed SSH login from 125.141.139.9 (KR/South Korea/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 29 14:55:51 ubnt-55d23 sshd[17934]: Invalid user vtg from 125.141.139.9 port 35384
Mar 29 14:55:53 ubnt-55d23 sshd[17934]: Failed password for invalid user vtg from 125.141.139.9 port 35384 ssh2
2020-03-29 23:46:08
212.129.239.160 attackspambots
20 attempts against mh-misbehave-ban on float
2020-03-30 00:07:23
116.12.200.194 attackspambots
Unauthorized connection attempt from IP address 116.12.200.194 on Port 445(SMB)
2020-03-30 00:03:29
182.23.36.210 attackspam
Unauthorized connection attempt from IP address 182.23.36.210 on Port 445(SMB)
2020-03-30 00:07:45
5.74.24.85 attackbotsspam
Unauthorized connection attempt from IP address 5.74.24.85 on Port 445(SMB)
2020-03-29 23:58:54
92.51.90.238 attack
Unauthorised access (Mar 29) SRC=92.51.90.238 LEN=52 TTL=115 ID=23943 DF TCP DPT=445 WINDOW=8192 SYN
2020-03-30 00:32:54
190.207.66.118 attack
1585490015 - 03/29/2020 15:53:35 Host: 190.207.66.118/190.207.66.118 Port: 445 TCP Blocked
2020-03-29 23:53:19
2a03:b0c0:3:e0::33c:b001 attackspam
xmlrpc attack
2020-03-29 23:44:23
183.89.51.23 attack
DATE:2020-03-29 14:42:03, IP:183.89.51.23, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-03-30 00:00:35
139.162.113.204 attack
Unauthorized connection attempt detected from IP address 139.162.113.204 to port 443 [T]
2020-03-30 00:30:51
117.48.206.156 attackbotsspam
Fail2Ban Ban Triggered
2020-03-30 00:09:02
112.26.44.112 attackbotsspam
Mar 29 15:48:30 v22018086721571380 sshd[2634]: Failed password for invalid user jvl from 112.26.44.112 port 33454 ssh2
Mar 29 15:51:03 v22018086721571380 sshd[3055]: Failed password for invalid user xkq from 112.26.44.112 port 47244 ssh2
2020-03-30 00:25:25

Recently Reported IPs

122.181.106.40 231.131.168.255 55.27.223.168 87.105.27.242
63.24.245.196 240.201.58.92 18.36.207.7 144.86.46.254
215.191.47.99 212.177.186.109 132.74.133.126 117.22.255.221
95.184.224.244 22.219.0.42 91.33.188.88 34.197.146.182
179.109.10.221 208.235.28.113 231.37.184.83 14.32.184.242