Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ääsmäe

Region: Harju County

Country: Estonia

Internet Service Provider: Tele2

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.119.144.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32750
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.119.144.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032100 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 21 18:02:40 CST 2025
;; MSG SIZE  rcvd: 107
Host info
54.144.119.212.in-addr.arpa domain name pointer m212-119-144-54.cust.tele2.ee.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.144.119.212.in-addr.arpa	name = m212-119-144-54.cust.tele2.ee.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
36.81.219.229 attackspambots
firewall-block, port(s): 445/tcp
2019-07-18 04:51:42
51.77.221.191 attack
Jul 17 21:42:57 mail sshd\[21083\]: Failed password for root from 51.77.221.191 port 39088 ssh2
Jul 17 21:59:58 mail sshd\[21254\]: Invalid user rabbitmq from 51.77.221.191 port 58154
...
2019-07-18 05:15:37
71.202.255.63 attackbots
SSH/22 MH Probe, BF, Hack -
2019-07-18 04:41:06
121.201.33.222 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(07172048)
2019-07-18 04:41:41
193.201.224.214 attackspambots
Jul 17 21:20:55 nextcloud sshd\[9302\]: Invalid user 0 from 193.201.224.214
Jul 17 21:20:55 nextcloud sshd\[9302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.201.224.214
Jul 17 21:20:57 nextcloud sshd\[9302\]: Failed password for invalid user 0 from 193.201.224.214 port 37894 ssh2
...
2019-07-18 04:39:39
202.29.39.1 attack
Jul 17 02:37:26 *** sshd[8284]: Failed password for invalid user carshowguide from 202.29.39.1 port 33400 ssh2
2019-07-18 05:16:32
103.99.75.171 attackspambots
Unauthorized connection attempt from IP address 103.99.75.171 on Port 445(SMB)
2019-07-18 04:46:29
125.209.123.181 attackspam
Jul 17 16:34:43 vps200512 sshd\[11587\]: Invalid user cyp from 125.209.123.181
Jul 17 16:34:43 vps200512 sshd\[11587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.209.123.181
Jul 17 16:34:46 vps200512 sshd\[11587\]: Failed password for invalid user cyp from 125.209.123.181 port 34647 ssh2
Jul 17 16:42:10 vps200512 sshd\[11831\]: Invalid user text from 125.209.123.181
Jul 17 16:42:10 vps200512 sshd\[11831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.209.123.181
2019-07-18 05:11:25
89.176.9.98 attackbots
Jul 17 22:34:59 vps691689 sshd[22453]: Failed password for root from 89.176.9.98 port 36792 ssh2
Jul 17 22:40:02 vps691689 sshd[22510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.176.9.98
...
2019-07-18 04:44:43
49.81.39.66 attackspambots
Brute force SMTP login attempts.
2019-07-18 05:08:48
212.205.238.168 attack
[portscan] tcp/23 [TELNET]
*(RWIN=10757)(07172048)
2019-07-18 05:09:12
185.175.93.18 attackspam
Fail2Ban Ban Triggered
2019-07-18 04:37:39
162.243.142.228 attack
firewall-block, port(s): 623/udp
2019-07-18 04:39:07
129.204.42.62 attackbotsspam
Jul 17 22:47:41 OPSO sshd\[24093\]: Invalid user zhang from 129.204.42.62 port 53676
Jul 17 22:47:41 OPSO sshd\[24093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.42.62
Jul 17 22:47:43 OPSO sshd\[24093\]: Failed password for invalid user zhang from 129.204.42.62 port 53676 ssh2
Jul 17 22:53:23 OPSO sshd\[24626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.42.62  user=sshd
Jul 17 22:53:25 OPSO sshd\[24626\]: Failed password for sshd from 129.204.42.62 port 50710 ssh2
2019-07-18 05:02:54
104.206.128.30 attackbotsspam
3306/tcp 1433/tcp 52311/tcp...
[2019-06-10/07-17]31pkt,15pt.(tcp),1pt.(udp)
2019-07-18 04:43:12

Recently Reported IPs

207.115.75.163 104.9.125.173 236.115.30.228 120.32.188.61
102.118.183.200 199.58.95.250 240.174.234.221 102.118.183.114
102.118.183.65 102.118.183.156 69.23.7.46 213.0.136.245
118.145.177.128 118.145.177.132 29.177.194.233 147.161.200.232
244.144.129.224 172.96.88.146 202.240.115.198 151.191.243.248