Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Newark

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.12.5.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51455
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;204.12.5.158.			IN	A

;; AUTHORITY SECTION:
.			232	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090101 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 02 12:15:15 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 158.5.12.204.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 158.5.12.204.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.58.119.125 attack
Automatic report - Banned IP Access
2020-05-16 04:02:32
68.183.238.182 attackspambots
Lines containing failures of 68.183.238.182
May 14 15:32:35 kmh-vmh-002-fsn07 sshd[8010]: Invalid user nagios from 68.183.238.182 port 46828
May 14 15:32:35 kmh-vmh-002-fsn07 sshd[8010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.238.182 
May 14 15:32:38 kmh-vmh-002-fsn07 sshd[8010]: Failed password for invalid user nagios from 68.183.238.182 port 46828 ssh2
May 14 15:32:40 kmh-vmh-002-fsn07 sshd[8010]: Received disconnect from 68.183.238.182 port 46828:11: Bye Bye [preauth]
May 14 15:32:40 kmh-vmh-002-fsn07 sshd[8010]: Disconnected from invalid user nagios 68.183.238.182 port 46828 [preauth]
May 14 15:47:50 kmh-vmh-002-fsn07 sshd[32300]: Invalid user neetha from 68.183.238.182 port 51972
May 14 15:47:50 kmh-vmh-002-fsn07 sshd[32300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.238.182 
May 14 15:47:52 kmh-vmh-002-fsn07 sshd[32300]: Failed password for invalid user neet........
------------------------------
2020-05-16 04:14:52
129.204.188.93 attackspam
May 15 22:32:40 lukav-desktop sshd\[22006\]: Invalid user Manager from 129.204.188.93
May 15 22:32:40 lukav-desktop sshd\[22006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.188.93
May 15 22:32:42 lukav-desktop sshd\[22006\]: Failed password for invalid user Manager from 129.204.188.93 port 45012 ssh2
May 15 22:37:44 lukav-desktop sshd\[22067\]: Invalid user cary from 129.204.188.93
May 15 22:37:44 lukav-desktop sshd\[22067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.188.93
2020-05-16 03:52:29
51.83.70.93 attack
May 15 21:47:15 piServer sshd[24956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.70.93 
May 15 21:47:16 piServer sshd[24956]: Failed password for invalid user admin from 51.83.70.93 port 49790 ssh2
May 15 21:50:53 piServer sshd[25267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.70.93 
...
2020-05-16 04:16:26
190.147.139.216 attack
2020-05-15T20:08:10.063057shield sshd\[26306\]: Invalid user naren from 190.147.139.216 port 44360
2020-05-15T20:08:10.072704shield sshd\[26306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.147.139.216
2020-05-15T20:08:12.714842shield sshd\[26306\]: Failed password for invalid user naren from 190.147.139.216 port 44360 ssh2
2020-05-15T20:10:59.403516shield sshd\[26776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.147.139.216  user=root
2020-05-15T20:11:01.915079shield sshd\[26776\]: Failed password for root from 190.147.139.216 port 56652 ssh2
2020-05-16 04:17:59
103.251.27.215 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-05-16 03:55:50
218.26.30.58 attack
Port probing on unauthorized port 1433
2020-05-16 04:06:25
167.114.115.33 attackspambots
Invalid user gmodserver from 167.114.115.33 port 52818
2020-05-16 03:59:40
223.206.235.79 attackspam
scan r
2020-05-16 03:53:37
139.170.150.253 attackspam
2020-05-15T17:04:59.737513abusebot-8.cloudsearch.cf sshd[510]: Invalid user nagios from 139.170.150.253 port 39222
2020-05-15T17:04:59.746830abusebot-8.cloudsearch.cf sshd[510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.170.150.253
2020-05-15T17:04:59.737513abusebot-8.cloudsearch.cf sshd[510]: Invalid user nagios from 139.170.150.253 port 39222
2020-05-15T17:05:01.848743abusebot-8.cloudsearch.cf sshd[510]: Failed password for invalid user nagios from 139.170.150.253 port 39222 ssh2
2020-05-15T17:07:45.602459abusebot-8.cloudsearch.cf sshd[655]: Invalid user test from 139.170.150.253 port 24583
2020-05-15T17:07:45.613522abusebot-8.cloudsearch.cf sshd[655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.170.150.253
2020-05-15T17:07:45.602459abusebot-8.cloudsearch.cf sshd[655]: Invalid user test from 139.170.150.253 port 24583
2020-05-15T17:07:47.840464abusebot-8.cloudsearch.cf sshd[655]: Failed 
...
2020-05-16 03:51:09
69.174.91.32 attackbotsspam
fell into ViewStateTrap:paris
2020-05-16 04:22:01
148.227.227.66 attack
*Port Scan* detected from 148.227.227.66 (MX/Mexico/Sinaloa/Culiacán (Privada del Real)/-). 4 hits in the last 250 seconds
2020-05-16 03:50:26
138.197.179.111 attack
May 15 21:44:28 electroncash sshd[63238]: Invalid user tunnel from 138.197.179.111 port 55686
May 15 21:44:28 electroncash sshd[63238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.179.111 
May 15 21:44:28 electroncash sshd[63238]: Invalid user tunnel from 138.197.179.111 port 55686
May 15 21:44:30 electroncash sshd[63238]: Failed password for invalid user tunnel from 138.197.179.111 port 55686 ssh2
May 15 21:47:47 electroncash sshd[64134]: Invalid user subrat from 138.197.179.111 port 34542
...
2020-05-16 04:00:24
92.246.84.185 attack
[2020-05-15 15:02:16] NOTICE[1157][C-00005046] chan_sip.c: Call from '' (92.246.84.185:59835) to extension '50001146406820583' rejected because extension not found in context 'public'.
[2020-05-15 15:02:16] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-15T15:02:16.861-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="50001146406820583",SessionID="0x7f5f100266a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/92.246.84.185/59835",ACLName="no_extension_match"
[2020-05-15 15:03:56] NOTICE[1157] chan_sip.c: Registration from '' failed for '92.246.84.185:49892' - Wrong password
[2020-05-15 15:03:56] SECURITY[1173] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-05-15T15:03:56.290-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="8989",SessionID="0x7f5f10b1c8b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/92.246.84.185/49892",Challenge="24d9e
...
2020-05-16 04:22:23
221.214.74.10 attackbots
SSH invalid-user multiple login try
2020-05-16 04:01:44

Recently Reported IPs

18.121.226.161 148.91.101.13 91.64.113.2 59.130.248.7
156.20.66.40 82.26.238.63 210.209.98.232 194.226.99.115
160.0.63.115 153.93.110.155 84.252.42.197 16.45.7.94
39.80.162.152 81.106.194.146 103.203.100.246 191.215.125.9
136.182.29.212 101.15.94.165 181.190.75.127 145.94.10.97