Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.212.97.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38902
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.212.97.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 15:07:25 CST 2025
;; MSG SIZE  rcvd: 104
Host info
54.97.212.2.in-addr.arpa domain name pointer dynamic-002-212-097-054.2.212.pool.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.97.212.2.in-addr.arpa	name = dynamic-002-212-097-054.2.212.pool.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
171.252.201.101 attack
Unauthorized connection attempt detected from IP address 171.252.201.101 to port 445
2020-01-08 04:34:14
49.88.112.62 attackbotsspam
Jan  7 21:27:52 jane sshd[20230]: Failed password for root from 49.88.112.62 port 42664 ssh2
Jan  7 21:27:56 jane sshd[20230]: Failed password for root from 49.88.112.62 port 42664 ssh2
...
2020-01-08 04:39:02
77.94.115.197 attackbotsspam
20/1/7@08:42:42: FAIL: Alarm-Network address from=77.94.115.197
...
2020-01-08 04:53:42
78.47.255.232 attackspambots
Jan  7 19:19:01 grey postfix/smtpd\[24772\]: NOQUEUE: reject: RCPT from static.232.255.47.78.clients.your-server.de\[78.47.255.232\]: 554 5.7.1 Service unavailable\; Client host \[78.47.255.232\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[78.47.255.232\]\; from=\ to=\ proto=SMTP helo=\
...
2020-01-08 04:44:22
156.203.49.88 attackbots
Unauthorized connection attempt detected from IP address 156.203.49.88 to port 23 [J]
2020-01-08 04:33:40
218.22.36.135 attackspambots
Jan  7 21:33:26 ns381471 sshd[9060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.22.36.135
Jan  7 21:33:27 ns381471 sshd[9060]: Failed password for invalid user ubnt from 218.22.36.135 port 4182 ssh2
2020-01-08 04:50:12
36.79.17.77 attackspambots
20/1/7@07:54:38: FAIL: Alarm-Network address from=36.79.17.77
...
2020-01-08 04:42:35
46.229.168.142 attackspambots
Automated report (2020-01-07T15:38:50+00:00). Scraper detected at this address.
2020-01-08 04:39:17
132.255.253.236 attackspam
Unauthorized connection attempt detected from IP address 132.255.253.236 to port 81 [J]
2020-01-08 04:16:53
92.118.38.56 attackspam
2020-01-07T20:39:55.814299beta postfix/smtpd[8403]: warning: unknown[92.118.38.56]: SASL LOGIN authentication failed: authentication failure
2020-01-07T20:40:25.840572beta postfix/smtpd[8403]: warning: unknown[92.118.38.56]: SASL LOGIN authentication failed: authentication failure
2020-01-07T20:40:54.646513beta postfix/smtpd[8403]: warning: unknown[92.118.38.56]: SASL LOGIN authentication failed: authentication failure
...
2020-01-08 04:42:01
128.199.220.232 attackbotsspam
Unauthorized connection attempt detected from IP address 128.199.220.232 to port 769 [J]
2020-01-08 04:15:08
179.124.36.195 attackbots
Jan  7 21:26:56 vpn01 sshd[29915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.124.36.195
Jan  7 21:26:57 vpn01 sshd[29915]: Failed password for invalid user ftpuser from 179.124.36.195 port 49415 ssh2
...
2020-01-08 04:36:53
118.150.201.142 attackspam
1578401664 - 01/07/2020 13:54:24 Host: 118.150.201.142/118.150.201.142 Port: 445 TCP Blocked
2020-01-08 04:27:59
78.128.113.30 attack
20 attempts against mh-misbehave-ban on comet.magehost.pro
2020-01-08 04:38:31
89.135.122.109 attackbots
Jan  7 19:05:38 lnxweb61 sshd[19454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.135.122.109
2020-01-08 04:37:59

Recently Reported IPs

228.234.184.239 254.38.228.223 7.125.95.152 197.29.234.121
76.199.26.78 233.95.111.239 104.244.171.20 148.138.233.185
213.203.89.168 64.227.15.187 36.50.215.116 190.25.17.42
52.104.121.129 17.127.72.39 229.28.57.72 250.38.87.97
162.54.43.104 141.163.124.73 20.12.186.200 173.126.246.44