Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Eindhoven

Region: Noord Brabant

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '212.61.0.0 - 212.61.255.255'

% Abuse contact for '212.61.0.0 - 212.61.255.255' is 'abuse@claranet.nl'

inetnum:        212.61.0.0 - 212.61.255.255
netname:        NL-IAE-980407
country:        NL
org:            ORG-VNNB1-RIPE
admin-c:        CBN8-RIPE
tech-c:         CBN8-RIPE
status:         ALLOCATED PA
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         IAE-MNT
mnt-routes:     IAE-MNT
created:        2002-07-23T14:49:47Z
last-modified:  2017-02-02T10:13:52Z
source:         RIPE

organisation:   ORG-VNNB1-RIPE
org-name:       Claranet Benelux B.V.
country:        NL
org-type:       LIR
address:        Flight Forum 840
address:        5657 DV
address:        Eindhoven
address:        NETHERLANDS
phone:          +31402393350
fax-no:         +31402393311
reg-nr:         17089780
admin-c:        MVH305-RIPE
admin-c:        MVZ91-RIPE
admin-c:        DJF
mnt-ref:        IAE-MNT
mnt-ref:        RIPE-NCC-HM-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         IAE-MNT
abuse-c:        CBN8-RIPE
tech-c:         CBN8-RIPE
created:        2004-04-17T11:41:22Z
last-modified:  2026-04-29T05:30:25Z
source:         RIPE # Filtered

role:           Claranet Benelux Netmaster
address:        Claranet Benelux B.V.
address:        Flight Forum 840
address:        5657 DV
address:        Eindhoven
address:        The Netherlands
phone:          +31 40 2393393
fax-no:         +31 40 2393311
abuse-mailbox:  abuse@claranet.nl
admin-c:        MVZ91-RIPE
tech-c:         MVZ91-RIPE
tech-c:         MVH305-RIPE
nic-hdl:        CBN8-RIPE
mnt-by:         IAE-MNT
created:        2006-10-17T12:30:04Z
last-modified:  2024-05-01T13:27:12Z
source:         RIPE # Filtered

% Information related to '212.61.0.0/16AS8426'

route:          212.61.0.0/16
descr:          CLARANL-AGG0
origin:         AS8426
mnt-by:         IAE-MNT
mnt-by:         AS8426-MNT
created:        2007-11-21T18:34:45Z
last-modified:  2007-11-21T18:34:45Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.122 (ABERDEEN)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.61.32.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27654
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.61.32.20.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026043002 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 01 03:14:09 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 20.32.61.212.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.32.61.212.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.239.47.66 attackspambots
Feb 12 14:43:15 legacy sshd[389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.47.66
Feb 12 14:43:18 legacy sshd[389]: Failed password for invalid user dysis from 219.239.47.66 port 49374 ssh2
Feb 12 14:47:07 legacy sshd[618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.47.66
...
2020-02-12 21:57:15
91.217.43.219 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-12 21:56:10
41.33.72.154 attack
1581515215 - 02/12/2020 14:46:55 Host: 41.33.72.154/41.33.72.154 Port: 445 TCP Blocked
2020-02-12 22:11:28
220.133.88.86 attackspambots
firewall-block, port(s): 23/tcp
2020-02-12 22:02:03
139.59.95.216 attackspam
Feb 12 05:46:32 mockhub sshd[14567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.95.216
Feb 12 05:46:34 mockhub sshd[14567]: Failed password for invalid user wjc from 139.59.95.216 port 32960 ssh2
...
2020-02-12 22:34:36
120.138.126.33 attackspam
SSH/22 MH Probe, BF, Hack -
2020-02-12 21:58:38
86.47.105.142 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-12 22:14:46
149.56.12.88 attackspambots
Lines containing failures of 149.56.12.88
Feb 10 21:55:47 dns01 sshd[26992]: Invalid user muj from 149.56.12.88 port 33124
Feb 10 21:55:47 dns01 sshd[26992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.12.88
Feb 10 21:55:49 dns01 sshd[26992]: Failed password for invalid user muj from 149.56.12.88 port 33124 ssh2
Feb 10 21:55:49 dns01 sshd[26992]: Received disconnect from 149.56.12.88 port 33124:11: Bye Bye [preauth]
Feb 10 21:55:49 dns01 sshd[26992]: Disconnected from invalid user muj 149.56.12.88 port 33124 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=149.56.12.88
2020-02-12 22:06:50
103.219.112.48 attackspambots
Feb 12 13:43:44 web8 sshd\[28456\]: Invalid user livia123 from 103.219.112.48
Feb 12 13:43:44 web8 sshd\[28456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.112.48
Feb 12 13:43:46 web8 sshd\[28456\]: Failed password for invalid user livia123 from 103.219.112.48 port 36734 ssh2
Feb 12 13:47:09 web8 sshd\[30153\]: Invalid user shree from 103.219.112.48
Feb 12 13:47:09 web8 sshd\[30153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.112.48
2020-02-12 21:55:18
188.162.49.225 attackspambots
Unauthorized connection attempt from IP address 188.162.49.225 on Port 445(SMB)
2020-02-12 22:26:12
163.44.159.221 attackbotsspam
2020-02-12T09:07:43.169282abusebot-2.cloudsearch.cf sshd[29759]: Invalid user pul from 163.44.159.221 port 38002
2020-02-12T09:07:43.178594abusebot-2.cloudsearch.cf sshd[29759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=v163-44-159-221.a01a.g.sin1.static.cnode.io
2020-02-12T09:07:43.169282abusebot-2.cloudsearch.cf sshd[29759]: Invalid user pul from 163.44.159.221 port 38002
2020-02-12T09:07:45.047021abusebot-2.cloudsearch.cf sshd[29759]: Failed password for invalid user pul from 163.44.159.221 port 38002 ssh2
2020-02-12T09:10:02.131749abusebot-2.cloudsearch.cf sshd[29877]: Invalid user porter from 163.44.159.221 port 60432
2020-02-12T09:10:02.138650abusebot-2.cloudsearch.cf sshd[29877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=v163-44-159-221.a01a.g.sin1.static.cnode.io
2020-02-12T09:10:02.131749abusebot-2.cloudsearch.cf sshd[29877]: Invalid user porter from 163.44.159.221 port 60432
2020-02-12
...
2020-02-12 21:48:45
196.202.83.252 attackspam
port scan and connect, tcp 23 (telnet)
2020-02-12 22:14:14
123.255.251.253 attackspam
port scan and connect, tcp 22 (ssh)
2020-02-12 21:47:41
88.27.252.26 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-12 22:02:33
218.92.0.200 attack
Feb 12 14:59:38 silence02 sshd[9200]: Failed password for root from 218.92.0.200 port 55611 ssh2
Feb 12 15:01:16 silence02 sshd[9314]: Failed password for root from 218.92.0.200 port 15185 ssh2
2020-02-12 22:04:02

Recently Reported IPs

207.130.115.71 115.133.247.67 34.130.124.113 28.157.39.147
2606:4700:10::6814:6338 2606:4700:10::ac43:2325 119.204.109.61 3.106.209.194
128.241.227.123 64.179.162.164 148.96.94.85 2606:4700:10::6816:2815
43.160.240.216 63.34.145.48 157.230.123.151 14.212.68.42
146.103.41.75 54.91.45.104 2606:4700:10::6814:6558 2606:4700:10::6814:6199