Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: Noord Holland

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2a12:5940:5352::2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 44791
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2a12:5940:5352::2.		IN	A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Mon Jul 08 01:47:56 CST 2024
;; MSG SIZE  rcvd: 46

'
Host info
b'Host 2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.5.3.5.0.4.9.5.2.1.a.2.ip6.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 2a12:5940:5352::2.in-addr.arpa: SERVFAIL
Related comments:
IP Type Details Datetime
120.92.149.231 attackbotsspam
Aug 19 19:17:36 php1 sshd\[21043\]: Invalid user ark from 120.92.149.231
Aug 19 19:17:36 php1 sshd\[21043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.149.231
Aug 19 19:17:38 php1 sshd\[21043\]: Failed password for invalid user ark from 120.92.149.231 port 2738 ssh2
Aug 19 19:22:34 php1 sshd\[21493\]: Invalid user brd from 120.92.149.231
Aug 19 19:22:34 php1 sshd\[21493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.149.231
2020-08-20 14:10:04
3.15.140.156 attack
Trolling for resource vulnerabilities
2020-08-20 14:35:57
222.179.205.14 attackspambots
$f2bV_matches
2020-08-20 14:32:15
66.249.79.121 attackspam
Automatic report - Banned IP Access
2020-08-20 14:06:41
222.186.42.155 attack
Aug 20 08:28:58 dev0-dcde-rnet sshd[13417]: Failed password for root from 222.186.42.155 port 23442 ssh2
Aug 20 08:29:08 dev0-dcde-rnet sshd[13420]: Failed password for root from 222.186.42.155 port 16582 ssh2
2020-08-20 14:31:54
49.235.164.107 attack
Invalid user oc from 49.235.164.107 port 40274
2020-08-20 14:30:37
211.170.61.184 attackbots
sshd jail - ssh hack attempt
2020-08-20 14:17:17
217.149.7.196 attackbots
Automatic report - XMLRPC Attack
2020-08-20 13:55:23
222.186.173.226 attack
SSH brutforce
2020-08-20 14:29:47
213.32.23.58 attackbots
Aug 20 07:36:33 marvibiene sshd[25105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.23.58 
Aug 20 07:36:35 marvibiene sshd[25105]: Failed password for invalid user xyj from 213.32.23.58 port 60776 ssh2
Aug 20 07:51:04 marvibiene sshd[26120]: Failed password for root from 213.32.23.58 port 45422 ssh2
2020-08-20 14:04:35
123.59.120.36 attackspambots
Aug 20 07:20:03 fhem-rasp sshd[16986]: Invalid user xiaowei from 123.59.120.36 port 44474
...
2020-08-20 14:33:38
161.35.125.96 attackbots
Aug 20 08:44:02 ift sshd\[50272\]: Failed password for root from 161.35.125.96 port 59648 ssh2Aug 20 08:44:10 ift sshd\[50282\]: Invalid user oracle from 161.35.125.96Aug 20 08:44:12 ift sshd\[50282\]: Failed password for invalid user oracle from 161.35.125.96 port 46438 ssh2Aug 20 08:44:22 ift sshd\[50284\]: Failed password for root from 161.35.125.96 port 33146 ssh2Aug 20 08:44:28 ift sshd\[50301\]: Invalid user postgres from 161.35.125.96
...
2020-08-20 14:02:35
79.137.72.121 attackbots
$f2bV_matches
2020-08-20 14:01:36
104.236.203.13 attackspam
104.236.203.13 - - \[20/Aug/2020:05:52:49 +0200\] "POST /wp-login.php HTTP/1.0" 200 8723 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.236.203.13 - - \[20/Aug/2020:05:53:01 +0200\] "POST /wp-login.php HTTP/1.0" 200 8551 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.236.203.13 - - \[20/Aug/2020:05:53:07 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 935 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-20 14:36:57
61.223.39.66 attackbots
20/8/19@23:53:05: FAIL: Alarm-Network address from=61.223.39.66
20/8/19@23:53:05: FAIL: Alarm-Network address from=61.223.39.66
...
2020-08-20 14:38:05

Recently Reported IPs

166.1.131.37 78.153.130.62 146.19.253.250 146.196.122.252
178.128.103.58 223.72.29.20 23.225.172.174 125.195.25.4
144.76.22.44 23.225.172.166 45.191.99.235 116.30.120.119
116.30.123.178 243.90.45.221 47.164.20.137 125.56.201.112
23.77.204.169 23.46.155.36 255.113.6.84 218.102.129.159