Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nürnberg

Region: Bayern

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2a03:4000:53:cb0:642b:2eff:fe41:ed09
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 6227
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2a03:4000:53:cb0:642b:2eff:fe41:ed09. IN A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Thu Apr 03 14:41:25 CST 2025
;; MSG SIZE  rcvd: 65

'
Host info
b'Host 9.0.d.e.1.4.e.f.f.f.e.2.b.2.4.6.0.b.c.0.3.5.0.0.0.0.0.4.3.0.a.2.ip6.arpa not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 2a03:4000:53:cb0:642b:2eff:fe41:ed09.in-addr.arpa: SERVFAIL
Related comments:
IP Type Details Datetime
14.18.93.114 attack
Invalid user laura from 14.18.93.114 port 40208
2019-10-19 07:54:27
185.209.0.12 attackbots
10/18/2019-23:56:48.166989 185.209.0.12 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-19 07:44:56
188.113.161.142 attack
9001/tcp
[2019-10-18]1pkt
2019-10-19 07:38:25
46.105.112.107 attackbots
Automatic report - Banned IP Access
2019-10-19 07:35:42
177.158.118.190 attackspambots
Automatic report - Port Scan Attack
2019-10-19 07:32:28
14.230.227.21 attack
Brute force SMTP login attempted.
...
2019-10-19 07:29:44
51.77.141.158 attackbotsspam
Oct 18 23:52:21 cvbnet sshd[4472]: Failed password for root from 51.77.141.158 port 40662 ssh2
...
2019-10-19 07:43:30
123.207.188.95 attack
Oct 18 17:03:07 plusreed sshd[27515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.188.95  user=root
Oct 18 17:03:09 plusreed sshd[27515]: Failed password for root from 123.207.188.95 port 59308 ssh2
...
2019-10-19 07:27:41
112.33.16.34 attackbots
2019-10-18T23:37:05.558179abusebot-3.cloudsearch.cf sshd\[10712\]: Invalid user basti from 112.33.16.34 port 59798
2019-10-19 07:38:11
182.61.179.75 attackbots
Oct 18 09:38:51 kapalua sshd\[22655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.179.75  user=root
Oct 18 09:38:52 kapalua sshd\[22655\]: Failed password for root from 182.61.179.75 port 20824 ssh2
Oct 18 09:43:20 kapalua sshd\[23203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.179.75  user=root
Oct 18 09:43:23 kapalua sshd\[23203\]: Failed password for root from 182.61.179.75 port 60966 ssh2
Oct 18 09:47:53 kapalua sshd\[23608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.179.75  user=root
2019-10-19 07:45:39
106.12.89.190 attackspam
Oct 19 05:54:25 meumeu sshd[8673]: Failed password for root from 106.12.89.190 port 28633 ssh2
Oct 19 05:58:56 meumeu sshd[9267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.190 
Oct 19 05:58:58 meumeu sshd[9267]: Failed password for invalid user zumbusch from 106.12.89.190 port 10714 ssh2
...
2019-10-19 12:02:47
106.54.220.176 attackbotsspam
Oct 16 10:23:48 h2034429 sshd[16519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.220.176  user=r.r
Oct 16 10:23:50 h2034429 sshd[16519]: Failed password for r.r from 106.54.220.176 port 42018 ssh2
Oct 16 10:23:50 h2034429 sshd[16519]: Received disconnect from 106.54.220.176 port 42018:11: Bye Bye [preauth]
Oct 16 10:23:50 h2034429 sshd[16519]: Disconnected from 106.54.220.176 port 42018 [preauth]
Oct 16 10:43:27 h2034429 sshd[16808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.220.176  user=r.r
Oct 16 10:43:29 h2034429 sshd[16808]: Failed password for r.r from 106.54.220.176 port 43818 ssh2
Oct 16 10:43:29 h2034429 sshd[16808]: Received disconnect from 106.54.220.176 port 43818:11: Bye Bye [preauth]
Oct 16 10:43:29 h2034429 sshd[16808]: Disconnected from 106.54.220.176 port 43818 [preauth]
Oct 16 10:48:02 h2034429 sshd[16853]: pam_unix(sshd:auth): authentication failur........
-------------------------------
2019-10-19 07:31:57
13.126.222.2 attackspam
fail2ban honeypot
2019-10-19 07:31:42
122.8.112.106 attack
122.8.112.106 - - [18/Oct/2019:15:47:51 -0400] "GET /?page=products&action=view&manufacturerID=36&productID=../../etc/passwd&linkID=13130 HTTP/1.1" 302 - "https://simplexlock.com/?page=products&action=view&manufacturerID=36&productID=../../etc/passwd&linkID=13130" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-10-19 07:30:45
191.241.253.20 attackbots
postfix (unknown user, SPF fail or relay access denied)
2019-10-19 07:23:51

Recently Reported IPs

2a03:4000:3b:133:18b4:26ff:fe81:c222 2a03:4000:5:ca7:e4e3:96ff:fe30:8d25 148.241.237.103 2a03:4000:33:a6d:24ba:e0ff:fee8:ae8e
59.82.21.66 35.195.72.149 113.215.189.89 176.65.138.95
243.101.180.71 14.155.91.43 14.155.91.187 14.155.91.27
130.74.88.152 240.49.61.184 90.53.80.23 119.74.204.178
123.146.131.100 173.82.195.144 183.199.202.169 204.13.152.7