Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frick

Region: Aargau

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '212.254.176.0 - 212.254.176.255'

% Abuse contact for '212.254.176.0 - 212.254.176.255' is 'abuse@vtx.ch'

inetnum:        212.254.176.0 - 212.254.176.255
netname:        TISCALI-ADSLFIXIP-N176
descr:          Tiscali DataComm AG
country:        CH
admin-c:        VDC-RIPE
tech-c:         VDC-RIPE
status:         ASSIGNED PA
mnt-by:         VTX-MNT
created:        2003-10-13T08:14:32Z
last-modified:  2006-02-22T14:30:27Z
source:         RIPE

role:           VTX Datacomm AG
address:        St. Alban-Anlage 44
address:        CH-4052 Basel
phone:          +41 61 561 1111
fax-no:         +41 61 561 1110
abuse-mailbox:  abuse@vtx.ch
remarks:        ==========================================================
remarks:        Spam and abuse issues : abuse@vtx.ch
remarks:        ----------------------------------------------------------
remarks:        If you think we try to hack or spam you,
remarks:        please read this : http://www.ripe.net/nicdb.html
remarks:        ==========================================================
admin-c:        RC64-RIPE
tech-c:         MC1375-RIPE
tech-c:         BW791-RIPE
tech-c:         JR11471-RIPE
tech-c:         JD10580-RIPE
nic-hdl:        VDC-RIPE
mnt-by:         VTX-MNT
created:        2006-01-31T14:33:18Z
last-modified:  2024-02-05T10:08:43Z
source:         RIPE # Filtered

% Information related to '212.254.0.0/16AS12350'

route:          212.254.0.0/16
descr:          CH.VTX LIR Range
origin:         AS12350
mnt-by:         VTX-MNT
created:        2006-04-24T09:27:42Z
last-modified:  2006-04-24T09:27:42Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.254.176.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35887
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.254.176.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042300 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 23 14:40:48 CST 2026
;; MSG SIZE  rcvd: 107
Host info
68.176.254.212.in-addr.arpa domain name pointer adsl-176-68-fixip.datacomm.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.176.254.212.in-addr.arpa	name = adsl-176-68-fixip.datacomm.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
168.227.17.16 attackspam
Email rejected due to spam filtering
2020-03-09 15:15:30
185.177.104.132 attack
Email rejected due to spam filtering
2020-03-09 14:47:08
211.106.110.49 attack
fail2ban
2020-03-09 15:11:57
106.51.230.186 attackspambots
Mar  9 07:37:05 ns381471 sshd[733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.230.186
Mar  9 07:37:07 ns381471 sshd[733]: Failed password for invalid user liuyukun from 106.51.230.186 port 48364 ssh2
2020-03-09 14:58:09
180.167.233.252 attack
Mar  9 09:20:44 areeb-Workstation sshd[13991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.233.252 
Mar  9 09:20:45 areeb-Workstation sshd[13991]: Failed password for invalid user qwewq from 180.167.233.252 port 44050 ssh2
...
2020-03-09 15:12:20
84.54.78.248 attackspambots
Email rejected due to spam filtering
2020-03-09 15:14:53
123.18.87.32 attack
1583725864 - 03/09/2020 04:51:04 Host: 123.18.87.32/123.18.87.32 Port: 445 TCP Blocked
2020-03-09 14:47:58
213.6.116.222 attackspam
Mar  9 04:49:26 mail.srvfarm.net postfix/smtpd[3846782]: NOQUEUE: reject: RCPT from unknown[213.6.116.222]: 554 5.7.1 Service unavailable; Client host [213.6.116.222] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?213.6.116.222; from= to= proto=ESMTP helo=
Mar  9 04:49:26 mail.srvfarm.net postfix/smtpd[3846782]: NOQUEUE: reject: RCPT from unknown[213.6.116.222]: 554 5.7.1 Service unavailable; Client host [213.6.116.222] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?213.6.116.222; from= to= proto=ESMTP helo=
Mar  9 04:49:27 mail.srvfarm.net postfix/smtpd[3846782]: NOQUEUE: reject: RCPT from unknown[213.6.116.222]: 554 5.7.1 Service unavailable; Client host [213.6.116.222] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?213.6.116.222; from= to= proto=ESM
2020-03-09 15:00:06
80.82.77.86 attackspam
80.82.77.86 was recorded 14 times by 9 hosts attempting to connect to the following ports: 32771,32768,49153. Incident counter (4h, 24h, all-time): 14, 77, 9787
2020-03-09 14:51:19
185.121.130.23 attackbots
firewall-block, port(s): 1433/tcp
2020-03-09 15:27:46
80.211.84.100 attackspam
firewall-block, port(s): 28967/tcp
2020-03-09 14:50:32
185.176.27.186 attackbots
Mar  9 08:22:05 debian-2gb-nbg1-2 kernel: \[5997677.707547\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.186 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=17260 PROTO=TCP SPT=58557 DPT=53366 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-09 15:29:06
125.124.143.182 attack
Mar  8 21:08:16 hanapaa sshd\[18009\]: Invalid user alexis from 125.124.143.182
Mar  8 21:08:16 hanapaa sshd\[18009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.143.182
Mar  8 21:08:18 hanapaa sshd\[18009\]: Failed password for invalid user alexis from 125.124.143.182 port 59712 ssh2
Mar  8 21:14:22 hanapaa sshd\[18546\]: Invalid user plex from 125.124.143.182
Mar  8 21:14:22 hanapaa sshd\[18546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.143.182
2020-03-09 15:21:47
69.229.6.34 attackbotsspam
Mar  9 03:43:34 localhost sshd[8270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.34  user=root
Mar  9 03:43:36 localhost sshd[8270]: Failed password for root from 69.229.6.34 port 58118 ssh2
Mar  9 03:46:54 localhost sshd[8882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.34  user=root
Mar  9 03:46:57 localhost sshd[8882]: Failed password for root from 69.229.6.34 port 54252 ssh2
Mar  9 03:50:19 localhost sshd[12741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.34  user=root
Mar  9 03:50:21 localhost sshd[12741]: Failed password for root from 69.229.6.34 port 50346 ssh2
...
2020-03-09 15:26:10
45.146.202.165 attackbots
Mar  9 05:43:02 mail.srvfarm.net postfix/smtpd[3865705]: NOQUEUE: reject: RCPT from unknown[45.146.202.165]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  9 05:43:02 mail.srvfarm.net postfix/smtpd[3863082]: NOQUEUE: reject: RCPT from unknown[45.146.202.165]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  9 05:43:02 mail.srvfarm.net postfix/smtpd[3862606]: NOQUEUE: reject: RCPT from unknown[45.146.202.165]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  9 05:43:03 mail.srvfarm.net postfix/smtpd[3865705]: NOQUEUE: reject: RCPT from
2020-03-09 15:07:18

Recently Reported IPs

206.189.81.157 54.8.81.200 117.82.44.28 2606:4700:10::6816:2804
2606:4700:10::6814:9886 2606:4700:10::ac43:2730 121.234.219.185 2606:4700:10::6816:1207
2606:4700:10::ac43:2432 2606:4700:10::6816:4091 25.41.63.67 42.48.3.248
34.79.87.109 43.134.111.60 185.35.5.45 2606:4700:10::6814:9968
2606:4700:10::6816:520 2606:4700:10::6816:1575 164.155.74.60 43.98.207.228