Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.202.254.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44080
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.202.254.5.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031201 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 03:20:31 CST 2025
;; MSG SIZE  rcvd: 106
Host info
5.254.202.212.in-addr.arpa domain name pointer port-212-202-254-5.static.as20676.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.254.202.212.in-addr.arpa	name = port-212-202-254-5.static.as20676.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.31.47.58 attack
2020-08-25T15:18:15.672150+02:00  sshd[6867]: Failed password for invalid user admin from 103.31.47.58 port 44366 ssh2
2020-08-25 23:56:36
59.108.66.247 attackbotsspam
Invalid user gmodserver from 59.108.66.247 port 12359
2020-08-26 00:02:20
218.36.86.40 attack
Invalid user tomcat from 218.36.86.40 port 39804
2020-08-25 23:31:02
52.152.160.139 attack
2020-08-25T07:35:39.388021morrigan.ad5gb.com sshd[616801]: Failed password for root from 52.152.160.139 port 40894 ssh2
2020-08-25T07:35:40.078167morrigan.ad5gb.com sshd[616801]: Disconnected from authenticating user root 52.152.160.139 port 40894 [preauth]
2020-08-26 00:03:45
171.15.17.161 attackspam
Aug 25 12:05:40 vps46666688 sshd[21327]: Failed password for root from 171.15.17.161 port 39655 ssh2
...
2020-08-25 23:42:29
104.236.151.120 attackbots
$f2bV_matches
2020-08-25 23:54:15
41.93.48.72 attack
41.93.48.72 - - [25/Aug/2020:14:40:28 +0100] "POST /wp-login.php HTTP/1.1" 200 2254 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
41.93.48.72 - - [25/Aug/2020:14:40:31 +0100] "POST /wp-login.php HTTP/1.1" 200 2229 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
41.93.48.72 - - [25/Aug/2020:14:40:32 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-25 23:29:15
45.172.212.246 attackspambots
2020-08-25T14:45:34.977193+02:00  sshd[19672]: Failed password for root from 45.172.212.246 port 52948 ssh2
2020-08-25 23:28:53
49.234.205.32 attack
Invalid user wup from 49.234.205.32 port 34578
2020-08-25 23:27:51
111.229.215.184 attack
Aug 25 16:50:54 fhem-rasp sshd[5595]: Invalid user fmaster from 111.229.215.184 port 45266
...
2020-08-25 23:52:09
54.38.55.136 attackspambots
Aug 25 17:33:06 jane sshd[15240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.55.136 
Aug 25 17:33:08 jane sshd[15240]: Failed password for invalid user dpi from 54.38.55.136 port 59618 ssh2
...
2020-08-26 00:02:46
118.145.8.50 attackspam
Aug 25 16:15:41 haigwepa sshd[800]: Failed password for root from 118.145.8.50 port 51657 ssh2
...
2020-08-25 23:50:10
139.186.73.248 attackbotsspam
Aug 25 16:28:44 vpn01 sshd[18914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.73.248
Aug 25 16:28:46 vpn01 sshd[18914]: Failed password for invalid user ranjit from 139.186.73.248 port 32982 ssh2
...
2020-08-25 23:44:38
134.175.230.209 attack
Invalid user openproject from 134.175.230.209 port 52458
2020-08-25 23:46:41
113.13.177.48 attack
Invalid user norm from 113.13.177.48 port 53330
2020-08-25 23:51:44

Recently Reported IPs

89.150.95.77 124.15.138.106 230.167.198.210 178.75.163.173
233.25.3.169 202.170.95.52 137.144.248.27 219.137.46.213
23.72.168.214 133.4.21.82 95.128.157.21 248.117.92.9
175.145.116.22 165.104.109.53 229.30.229.106 2.25.26.136
214.64.181.132 103.238.52.167 55.125.66.109 241.123.160.131