Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.159.241.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6634
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.159.241.54.			IN	A

;; AUTHORITY SECTION:
.			485	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023110200 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 02 21:43:47 CST 2023
;; MSG SIZE  rcvd: 107
Host info
54.241.159.212.in-addr.arpa domain name pointer ace-na.vms.atos-services.net.
54.241.159.212.in-addr.arpa domain name pointer vne-atos.vms.atos-services.net.
54.241.159.212.in-addr.arpa domain name pointer proxy.vms.atos-services.net.
54.241.159.212.in-addr.arpa domain name pointer vne-eu.vms.atos-services.net.
54.241.159.212.in-addr.arpa domain name pointer vne-na.vms.atos-services.net.
54.241.159.212.in-addr.arpa domain name pointer ace-eu.vms.atos-services.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.241.159.212.in-addr.arpa	name = ace-na.vms.atos-services.net.
54.241.159.212.in-addr.arpa	name = vne-atos.vms.atos-services.net.
54.241.159.212.in-addr.arpa	name = proxy.vms.atos-services.net.
54.241.159.212.in-addr.arpa	name = vne-eu.vms.atos-services.net.
54.241.159.212.in-addr.arpa	name = vne-na.vms.atos-services.net.
54.241.159.212.in-addr.arpa	name = ace-eu.vms.atos-services.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
107.170.202.141 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-10 00:45:14
43.249.192.59 attackbots
1433/tcp 8080/tcp 37215/tcp...
[2019-05-08/07-09]47pkt,10pt.(tcp)
2019-07-10 00:23:42
36.91.165.39 attackbots
Unauthorized IMAP connection attempt
2019-07-10 01:06:56
37.187.0.20 attack
Jul  9 20:37:42 itv-usvr-01 sshd[10674]: Invalid user zoom from 37.187.0.20
Jul  9 20:37:42 itv-usvr-01 sshd[10674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.0.20
Jul  9 20:37:42 itv-usvr-01 sshd[10674]: Invalid user zoom from 37.187.0.20
Jul  9 20:37:44 itv-usvr-01 sshd[10674]: Failed password for invalid user zoom from 37.187.0.20 port 54210 ssh2
Jul  9 20:40:52 itv-usvr-01 sshd[10924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.0.20  user=news
Jul  9 20:40:54 itv-usvr-01 sshd[10924]: Failed password for news from 37.187.0.20 port 58982 ssh2
2019-07-10 00:14:51
188.143.232.232 attackspam
Unauthorised access (Jul  9) SRC=188.143.232.232 LEN=40 TTL=248 ID=129 TCP DPT=445 WINDOW=1024 SYN
2019-07-10 00:33:51
59.153.18.174 attackbotsspam
Caught in portsentry honeypot
2019-07-10 01:06:18
23.94.112.61 attackbots
19/7/9@09:49:00: FAIL: Alarm-Intrusion address from=23.94.112.61
...
2019-07-10 00:48:18
188.73.8.12 attack
Unauthorized IMAP connection attempt
2019-07-10 01:10:38
46.107.102.102 attack
$f2bV_matches
2019-07-10 01:10:04
193.188.22.185 attackspam
3389BruteforceFW23
2019-07-10 01:23:35
3.210.199.77 attackbots
Jul  9 13:38:31   TCP Attack: SRC=3.210.199.77 DST=[Masked] LEN=250 TOS=0x00 PREC=0x00 TTL=235  DF PROTO=TCP SPT=60396 DPT=80 WINDOW=913 RES=0x00 ACK PSH URGP=0
2019-07-10 01:19:12
130.61.83.71 attackspambots
Jul  9 14:10:20 *** sshd[32552]: Invalid user kk from 130.61.83.71
2019-07-10 01:27:53
147.135.121.118 attack
Jul  9 13:47:01 flomail sshd[28424]: Invalid user admin from 147.135.121.118
Jul  9 13:47:03 flomail sshd[28429]: Invalid user admin from 147.135.121.118
Jul  9 13:47:03 flomail sshd[28431]: Invalid user user from 147.135.121.118
2019-07-10 00:59:31
139.209.135.101 attack
firewall-block, port(s): 23/tcp
2019-07-10 00:44:28
181.56.225.43 attackbots
Autoban   181.56.225.43 AUTH/CONNECT
2019-07-10 00:38:10

Recently Reported IPs

203.0.113.58 102.217.123.221 102.133.232.81 45.137.68.26
103.222.20.104 92.236.199.166 234.230.190.11 31.129.111.23
62.113.98.116 109.249.28.160 217.100.121.253 162.158.179.28
172.71.218.45 172.71.122.113 214.71.193.43 232.204.104.184
149.40.50.52 47.128.62.125 136.243.176.105 136.243.176.12