Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Thessaloníki

Region: Kentriki Makedonia

Country: Greece

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '217.12.204.0 - 217.12.204.255'

% Abuse contact for '217.12.204.0 - 217.12.204.255' is 'abuse@greenfloid.com'

inetnum:        217.12.204.0 - 217.12.204.255
netname:        GF-GR-SKG
remarks:        Geofeed https://itldc.com/ipgeo.csv
descr:          ************************************************************
descr:          * As ISP we provide hosting, virtual, and dedicated servers.
descr:          *
descr:          * Those services are self-managed by our customers
descr:          * therefore, we are not using this IP space ourselves
descr:          * and it could be assigned to various end customers.
descr:          *
descr:          * In case of issues related to SPAM, Fraud, Phishing
descr:          * DDoS, port scans, or others, feel free to contact us
descr:          * with relevant info. Abuse email: abuse@greenfloid.com
descr:          ************************************************************
country:        GR
geoloc:         40.66145502 22.86590199
geofeed:        https://itldc.com/ipgeo.csv
admin-c:        GRFL-RIPE
tech-c:         GRFL-RIPE
status:         ASSIGNED PA
mnt-by:         GRFL-MNT
created:        2002-06-06T10:16:46Z
last-modified:  2025-06-13T20:19:35Z
source:         RIPE

person:         GreenFloid NOC
address:        East Jefferson Street, 2707
address:        Orlando, FL, 32803, USA
phone:          +1 561 2500001
nic-hdl:        GRFL-RIPE
mnt-by:         GRFL-MNT
created:        2018-09-10T07:52:11Z
last-modified:  2018-09-10T07:52:11Z
source:         RIPE

% Information related to '217.12.204.0/24AS8254'

route:          217.12.204.0/24
origin:         AS8254
mnt-by:         GRFL-MNT
created:        2025-06-13T20:41:53Z
last-modified:  2025-06-13T20:41:53Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.12.204.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 628
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.12.204.118.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033102 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 05:05:24 CST 2026
;; MSG SIZE  rcvd: 107
Host info
118.204.12.217.in-addr.arpa domain name pointer s5.thessaloniki.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
118.204.12.217.in-addr.arpa	name = s5.thessaloniki.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
181.48.46.195 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-09T21:07:28Z and 2020-08-09T21:15:32Z
2020-08-10 07:06:12
51.15.241.102 attackspambots
2020-08-09T20:12:58.384509dmca.cloudsearch.cf sshd[24213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.241.102  user=root
2020-08-09T20:13:00.406848dmca.cloudsearch.cf sshd[24213]: Failed password for root from 51.15.241.102 port 51124 ssh2
2020-08-09T20:16:19.246266dmca.cloudsearch.cf sshd[24369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.241.102  user=root
2020-08-09T20:16:21.529560dmca.cloudsearch.cf sshd[24369]: Failed password for root from 51.15.241.102 port 55142 ssh2
2020-08-09T20:19:37.694069dmca.cloudsearch.cf sshd[24554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.241.102  user=root
2020-08-09T20:19:39.490795dmca.cloudsearch.cf sshd[24554]: Failed password for root from 51.15.241.102 port 59128 ssh2
2020-08-09T20:22:50.947393dmca.cloudsearch.cf sshd[24703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t
...
2020-08-10 07:34:45
139.59.18.211 attackspam
WordPress XMLRPC scan :: 139.59.18.211 1.264 - [09/Aug/2020:20:23:12  0000] [censored_1] "POST /xmlrpc.php HTTP/1.1" 503 18231 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-08-10 07:20:40
201.91.86.28 attack
Aug  9 17:00:24 ny01 sshd[31304]: Failed password for root from 201.91.86.28 port 57813 ssh2
Aug  9 17:05:09 ny01 sshd[31870]: Failed password for root from 201.91.86.28 port 31458 ssh2
2020-08-10 07:02:07
107.170.135.29 attackbotsspam
Aug 10 01:19:34 vm1 sshd[3769]: Failed password for root from 107.170.135.29 port 47318 ssh2
...
2020-08-10 07:40:30
222.186.15.115 attackspam
Aug 10 01:25:02 vmanager6029 sshd\[29275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115  user=root
Aug 10 01:25:04 vmanager6029 sshd\[29267\]: error: PAM: Authentication failure for root from 222.186.15.115
Aug 10 01:25:05 vmanager6029 sshd\[29280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115  user=root
2020-08-10 07:25:49
107.175.63.84 attackbotsspam
Aug  9 23:23:42 ip40 sshd[24862]: Failed password for root from 107.175.63.84 port 36614 ssh2
...
2020-08-10 07:18:03
93.137.138.121 attack
Aug 10 01:43:48 journals sshd\[101210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.137.138.121  user=root
Aug 10 01:43:50 journals sshd\[101210\]: Failed password for root from 93.137.138.121 port 40622 ssh2
Aug 10 01:48:04 journals sshd\[101616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.137.138.121  user=root
Aug 10 01:48:06 journals sshd\[101616\]: Failed password for root from 93.137.138.121 port 52758 ssh2
Aug 10 01:52:23 journals sshd\[102034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.137.138.121  user=root
...
2020-08-10 07:09:38
110.43.42.91 attackspambots
2020-08-10T01:54:47.364653mail.standpoint.com.ua sshd[18193]: Invalid user com!@# from 110.43.42.91 port 41108
2020-08-10T01:54:47.367181mail.standpoint.com.ua sshd[18193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.42.91
2020-08-10T01:54:47.364653mail.standpoint.com.ua sshd[18193]: Invalid user com!@# from 110.43.42.91 port 41108
2020-08-10T01:54:49.263436mail.standpoint.com.ua sshd[18193]: Failed password for invalid user com!@# from 110.43.42.91 port 41108 ssh2
2020-08-10T01:57:52.842888mail.standpoint.com.ua sshd[18614]: Invalid user Qwert1!@ from 110.43.42.91 port 3088
...
2020-08-10 07:09:22
120.92.114.71 attackbotsspam
DATE:2020-08-09 22:23:19,IP:120.92.114.71,MATCHES:10,PORT:ssh
2020-08-10 07:16:09
194.26.25.10 attack
Multiport scan : 124 ports scanned 5002 5003 5010 5030 5037 5045 5058 5066 5067 5074 5087 5125 5130 5132 5152 5174 5195 5197 5224 5293 5294 5306 5391 5433 5449 5470 5487 5491 5504 5525 5528 5562 5581 5586 5607 5613 5629 5634 5641 5645 5658 5671 5686 5692 5700 5703 5713 5729 5742 5745 5758 5762 5763 5827 5872 5890 5905 5908 5929 5930 5956 5966 5987 5995 6014 6034 6035 6051 6053 6060 6072 6074 6076 6077 6093 6113 6114 6130 6139 6188 .....
2020-08-10 07:08:24
180.100.243.210 attack
Fail2Ban Ban Triggered
2020-08-10 07:38:15
45.88.110.138 attackspam
Aug 10 00:50:15 ip40 sshd[30829]: Failed password for root from 45.88.110.138 port 34098 ssh2
...
2020-08-10 07:17:26
200.146.84.48 attack
Aug  9 19:31:22 vps46666688 sshd[28116]: Failed password for root from 200.146.84.48 port 38548 ssh2
...
2020-08-10 07:36:44
183.247.214.63 attack
Unauthorised access (Aug  9) SRC=183.247.214.63 LEN=40 TOS=0x14 TTL=47 ID=44202 TCP DPT=8080 WINDOW=35655 SYN
2020-08-10 07:33:47

Recently Reported IPs

217.12.204.161 120.55.95.177 80.217.106.60 54.196.157.164
54.174.222.165 223.123.73.71 1.83.125.59 114.97.191.45
27.46.125.117 10.35.77.177 97.70.244.124 110.77.226.33
2606:4700:10::6814:6692 2606:4700:10::6814:5631 2606:4700:10::ac43:1591 2606:4700:10::6816:3038
2606:4700:10::6814:8843 94.26.88.32 35.203.210.110 162.243.116.182