Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.132.82.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43434
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.132.82.254.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 18:04:54 CST 2025
;; MSG SIZE  rcvd: 107
Host info
254.82.132.212.in-addr.arpa domain name pointer ip212-132-82-254.pbiaas.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
254.82.132.212.in-addr.arpa	name = ip212-132-82-254.pbiaas.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.48.115.236 attackspam
Jun 12 14:06:44 vmi345603 sshd[21006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.115.236
Jun 12 14:06:46 vmi345603 sshd[21006]: Failed password for invalid user tc from 201.48.115.236 port 42016 ssh2
...
2020-06-12 22:43:19
189.240.225.205 attackbotsspam
Jun 12 16:16:02 h2779839 sshd[31754]: Invalid user yulia from 189.240.225.205 port 34376
Jun 12 16:16:02 h2779839 sshd[31754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.240.225.205
Jun 12 16:16:02 h2779839 sshd[31754]: Invalid user yulia from 189.240.225.205 port 34376
Jun 12 16:16:04 h2779839 sshd[31754]: Failed password for invalid user yulia from 189.240.225.205 port 34376 ssh2
Jun 12 16:19:35 h2779839 sshd[31797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.240.225.205  user=root
Jun 12 16:19:37 h2779839 sshd[31797]: Failed password for root from 189.240.225.205 port 35896 ssh2
Jun 12 16:23:03 h2779839 sshd[31852]: Invalid user admin from 189.240.225.205 port 37396
Jun 12 16:23:03 h2779839 sshd[31852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.240.225.205
Jun 12 16:23:03 h2779839 sshd[31852]: Invalid user admin from 189.240.225.205 port
...
2020-06-12 22:35:46
103.200.23.81 attackspam
Jun 12 08:23:38 mail sshd\[42156\]: Invalid user test1 from 103.200.23.81
Jun 12 08:23:38 mail sshd\[42156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.200.23.81
...
2020-06-12 22:28:21
122.51.102.227 attackbotsspam
2020-06-12T11:56:13.838165Z 76a99f2435d0 New connection: 122.51.102.227:50908 (172.17.0.3:2222) [session: 76a99f2435d0]
2020-06-12T12:06:47.307428Z 2224acc3e35d New connection: 122.51.102.227:53944 (172.17.0.3:2222) [session: 2224acc3e35d]
2020-06-12 22:44:10
5.196.218.152 attackbots
Jun 12 16:22:41 dbanaszewski sshd[26313]: Unable to negotiate with 5.196.218.152 port 52053: no matching host key type found. Their offer: ssh-rsa,ssh-dss [preauth]
Jun 12 16:33:43 dbanaszewski sshd[26484]: Unable to negotiate with 5.196.218.152 port 43652: no matching host key type found. Their offer: ssh-rsa,ssh-dss [preauth]
2020-06-12 22:46:15
222.186.175.23 attack
06/12/2020-10:15:31.973678 222.186.175.23 Protocol: 6 ET SCAN Potential SSH Scan
2020-06-12 22:16:12
103.253.42.59 attack
[2020-06-12 10:27:33] NOTICE[1273][C-0000026b] chan_sip.c: Call from '' (103.253.42.59:53466) to extension '900146462607642' rejected because extension not found in context 'public'.
[2020-06-12 10:27:33] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-12T10:27:33.795-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="900146462607642",SessionID="0x7f31c0334138",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.253.42.59/53466",ACLName="no_extension_match"
[2020-06-12 10:28:44] NOTICE[1273][C-0000026c] chan_sip.c: Call from '' (103.253.42.59:49947) to extension '900246462607642' rejected because extension not found in context 'public'.
[2020-06-12 10:28:44] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-12T10:28:44.692-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="900246462607642",SessionID="0x7f31c0334138",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/
...
2020-06-12 22:46:45
205.252.40.193 attackspam
Jun 11 02:03:53 cumulus sshd[31621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.252.40.193  user=r.r
Jun 11 02:03:55 cumulus sshd[31621]: Failed password for r.r from 205.252.40.193 port 1089 ssh2
Jun 11 02:03:55 cumulus sshd[31621]: Received disconnect from 205.252.40.193 port 1089:11: Bye Bye [preauth]
Jun 11 02:03:55 cumulus sshd[31621]: Disconnected from 205.252.40.193 port 1089 [preauth]
Jun 11 02:13:26 cumulus sshd[32503]: Invalid user app from 205.252.40.193 port 60448
Jun 11 02:13:26 cumulus sshd[32503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.252.40.193
Jun 11 02:13:28 cumulus sshd[32503]: Failed password for invalid user app from 205.252.40.193 port 60448 ssh2
Jun 11 02:13:29 cumulus sshd[32503]: Received disconnect from 205.252.40.193 port 60448:11: Bye Bye [preauth]
Jun 11 02:13:29 cumulus sshd[32503]: Disconnected from 205.252.40.193 port 60448 [preauth]


........
--------------------------------
2020-06-12 22:22:21
178.62.23.108 attackspam
2020-06-12T12:49:28.338840shield sshd\[4377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.23.108  user=root
2020-06-12T12:49:30.788212shield sshd\[4377\]: Failed password for root from 178.62.23.108 port 47764 ssh2
2020-06-12T12:53:01.953597shield sshd\[5885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.23.108  user=root
2020-06-12T12:53:03.645014shield sshd\[5885\]: Failed password for root from 178.62.23.108 port 48532 ssh2
2020-06-12T12:56:39.889440shield sshd\[6956\]: Invalid user aldington from 178.62.23.108 port 49320
2020-06-12 22:12:25
185.39.11.48 attackbots
Here more information about 185.39.11.48 
info: [Swhostnamezerland] 62355 Network Dedicated SAS 
Connected: 8 servere(s) 
Reason: ssh 
Portscan/portflood
Ports: 20,22,110,554,993,1433 
Services: ftp-data,rtsp,imaps,ms-sql-s,ssh,pop3 
servere: Europe/Moscow (UTC+3) 
Found at blocklist: blocklist.de, zen.spamhaus.org, spfbl.net, abuseIPDB.com
myIP:89.179.244.250 
 
[2020-06-12 02:13:19] (tcp) myIP:20 <- 185.39.11.48:51068
[2020-06-12 02:16:10] (tcp) myIP:20 <- 185.39.11.48:51068
[2020-06-12 02:53:44] (tcp) myIP:554 <- 185.39.11.48:51068
[2020-06-12 03:19:22] (tcp) myIP:993 <- 185.39.11.48:51068
[2020-06-12 03:24:59] (tcp) myIP:1433 <- 185.39.11.48:51068
[2020-06-12 03:50:07] (tcp) myIP:22 <- 185.39.11.48:51068
[2020-06-12 03:58:07] (tcp) myIP:22 <- 185.39.11.48:51068
[2020-06-12 09:12:02] (tcp) myIP:110 <- 185.39.11.48:51068


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=185.39.11.48
2020-06-12 22:28:08
94.61.185.237 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-06-12 22:28:49
117.2.50.240 attackbots
06/12/2020-08:06:55.753455 117.2.50.240 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-06-12 22:36:41
51.254.205.6 attackspam
Jun 12 16:23:18 cosmoit sshd[22644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.205.6
2020-06-12 22:29:15
89.248.160.150 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 89 - port: 40854 proto: UDP cat: Misc Attack
2020-06-12 22:25:37
123.206.7.96 attackbotsspam
Jun 12 10:00:04 ny01 sshd[7043]: Failed password for root from 123.206.7.96 port 39774 ssh2
Jun 12 10:04:38 ny01 sshd[7632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.7.96
Jun 12 10:04:40 ny01 sshd[7632]: Failed password for invalid user virgina25 from 123.206.7.96 port 38548 ssh2
2020-06-12 22:13:03

Recently Reported IPs

227.123.66.132 27.199.53.52 114.195.37.139 99.115.161.161
34.32.143.229 101.26.138.28 50.180.67.106 94.176.154.163
252.150.99.117 152.245.249.81 127.117.41.103 162.252.133.108
155.158.162.72 101.128.253.66 193.247.11.60 165.1.106.106
71.133.128.22 87.197.127.171 64.130.239.54 193.50.158.54