Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Munsingen

Region: Bern

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.103.83.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62818
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;212.103.83.54.			IN	A

;; AUTHORITY SECTION:
.			112	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020102600 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 26 22:16:43 CST 2020
;; MSG SIZE  rcvd: 117
Host info
54.83.103.212.in-addr.arpa domain name pointer ve2.05.r.lag.ch.dfs.ce.as15576.nts.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.83.103.212.in-addr.arpa	name = ve2.05.r.lag.ch.dfs.ce.as15576.nts.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.232 attack
$f2bV_matches
2020-04-08 15:04:21
218.92.0.172 attackspam
Apr  8 08:32:48 minden010 sshd[14829]: Failed password for root from 218.92.0.172 port 62309 ssh2
Apr  8 08:33:01 minden010 sshd[14829]: error: maximum authentication attempts exceeded for root from 218.92.0.172 port 62309 ssh2 [preauth]
Apr  8 08:33:06 minden010 sshd[14931]: Failed password for root from 218.92.0.172 port 32129 ssh2
...
2020-04-08 14:40:14
182.151.60.73 attackspam
Apr  8 05:57:30  sshd\[7206\]: Invalid user jeff from 182.151.60.73Apr  8 05:57:32  sshd\[7206\]: Failed password for invalid user jeff from 182.151.60.73 port 48508 ssh2
...
2020-04-08 14:57:58
123.212.255.193 attackbotsspam
2020-04-08T05:17:01.621852abusebot-7.cloudsearch.cf sshd[31730]: Invalid user shiny from 123.212.255.193 port 34032
2020-04-08T05:17:01.629701abusebot-7.cloudsearch.cf sshd[31730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.212.255.193
2020-04-08T05:17:01.621852abusebot-7.cloudsearch.cf sshd[31730]: Invalid user shiny from 123.212.255.193 port 34032
2020-04-08T05:17:03.280281abusebot-7.cloudsearch.cf sshd[31730]: Failed password for invalid user shiny from 123.212.255.193 port 34032 ssh2
2020-04-08T05:25:12.144410abusebot-7.cloudsearch.cf sshd[32207]: Invalid user node from 123.212.255.193 port 48336
2020-04-08T05:25:12.148859abusebot-7.cloudsearch.cf sshd[32207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.212.255.193
2020-04-08T05:25:12.144410abusebot-7.cloudsearch.cf sshd[32207]: Invalid user node from 123.212.255.193 port 48336
2020-04-08T05:25:14.873107abusebot-7.cloudsearch.cf sshd[32
...
2020-04-08 14:30:49
196.188.42.130 attack
web-1 [ssh] SSH Attack
2020-04-08 14:28:38
140.143.127.179 attackbotsspam
Apr  7 22:38:07 server1 sshd\[31408\]: Failed password for invalid user update from 140.143.127.179 port 60952 ssh2
Apr  7 22:42:10 server1 sshd\[32602\]: Invalid user testftp from 140.143.127.179
Apr  7 22:42:10 server1 sshd\[32602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.127.179 
Apr  7 22:42:11 server1 sshd\[32602\]: Failed password for invalid user testftp from 140.143.127.179 port 60272 ssh2
Apr  7 22:46:08 server1 sshd\[1288\]: Invalid user marcela from 140.143.127.179
...
2020-04-08 14:53:51
195.167.156.180 attack
Apr  8 06:59:38 host sshd[63304]: Invalid user danny from 195.167.156.180 port 39180
...
2020-04-08 15:06:43
176.31.191.173 attackbotsspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-04-08 14:26:20
51.38.186.47 attack
Apr  8 07:54:42 mail sshd\[6272\]: Invalid user red5 from 51.38.186.47
Apr  8 07:54:42 mail sshd\[6272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.47
Apr  8 07:54:44 mail sshd\[6272\]: Failed password for invalid user red5 from 51.38.186.47 port 59444 ssh2
...
2020-04-08 14:47:06
217.182.70.150 attack
Apr  8 07:15:46 v22019038103785759 sshd\[2798\]: Invalid user oracle from 217.182.70.150 port 43056
Apr  8 07:15:46 v22019038103785759 sshd\[2798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.70.150
Apr  8 07:15:48 v22019038103785759 sshd\[2798\]: Failed password for invalid user oracle from 217.182.70.150 port 43056 ssh2
Apr  8 07:20:32 v22019038103785759 sshd\[3173\]: Invalid user cs from 217.182.70.150 port 55754
Apr  8 07:20:32 v22019038103785759 sshd\[3173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.70.150
...
2020-04-08 14:56:51
43.228.125.41 attackbotsspam
2020-04-08T07:03:00.685775ns386461 sshd\[26505\]: Invalid user ubuntu from 43.228.125.41 port 46854
2020-04-08T07:03:00.690381ns386461 sshd\[26505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.228.125.41
2020-04-08T07:03:02.220209ns386461 sshd\[26505\]: Failed password for invalid user ubuntu from 43.228.125.41 port 46854 ssh2
2020-04-08T07:11:57.372513ns386461 sshd\[2141\]: Invalid user developer from 43.228.125.41 port 55344
2020-04-08T07:11:57.377415ns386461 sshd\[2141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.228.125.41
...
2020-04-08 14:31:54
222.186.175.212 attackspambots
Apr  8 08:40:09 host01 sshd[23357]: Failed password for root from 222.186.175.212 port 42384 ssh2
Apr  8 08:40:12 host01 sshd[23357]: Failed password for root from 222.186.175.212 port 42384 ssh2
Apr  8 08:40:15 host01 sshd[23357]: Failed password for root from 222.186.175.212 port 42384 ssh2
Apr  8 08:40:20 host01 sshd[23357]: Failed password for root from 222.186.175.212 port 42384 ssh2
...
2020-04-08 14:42:54
66.206.38.56 attack
Apr  8 11:04:46 scivo sshd[20340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66-206-38-56.static.as40244.net  user=r.r
Apr  8 11:04:48 scivo sshd[20340]: Failed password for r.r from 66.206.38.56 port 38051 ssh2
Apr  8 11:04:48 scivo sshd[20340]: Received disconnect from 66.206.38.56: 11: Bye Bye [preauth]
Apr  8 11:04:50 scivo sshd[20342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66-206-38-56.static.as40244.net  user=r.r
Apr  8 11:04:52 scivo sshd[20342]: Failed password for r.r from 66.206.38.56 port 44255 ssh2
Apr  8 11:04:52 scivo sshd[20342]: Received disconnect from 66.206.38.56: 11: Bye Bye [preauth]
Apr  8 11:04:55 scivo sshd[20344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66-206-38-56.static.as40244.net  user=r.r
Apr  8 11:04:57 scivo sshd[20344]: Failed password for r.r from 66.206.38.56 port 51093 ssh2
Apr  8 11:04:58 sc........
-------------------------------
2020-04-08 15:05:06
183.134.66.112 attack
Apr  8 04:38:30 *** sshd[24130]: Invalid user deploy from 183.134.66.112
2020-04-08 15:02:01
91.132.0.203 attackbots
*Port Scan* detected from 91.132.0.203 (US/United States/California/Los Angeles (Downtown)/-). 4 hits in the last 20 seconds
2020-04-08 14:46:40

Recently Reported IPs

2804:14c:8586:4564:8dec:d242:3acb:7570 2804:14c:5982:8db7:a103:d56a:219b:d6e0 2804:14c:5982:8db7:c8e7:a5e4:2ad:57ca 2804:14c:4384:9caf:1800:372d:b21b:bff2
2804:14c:155:8b30:d1bb:53cc:77ac:f039 2804:14c:155:8b30:1955:f3be:cd36:9a07 2804:d55:4:d6fd::1 2804:7f2:886:d376:94fa:64c1:19d0:ad0d
2804:d45:8fee:8100:c9e2:ccf2:e07f:3b11 129.0.101.20 177.100.56.20 177.13.253.145
177.75.75.230 179.108.192.197 179.211.222.112 189.35.164.79
200.0.56.69 201.140.222.98 201.54.87.179 209.239.122.40