Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: Noord Holland

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2a12:5940:5352::2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 44791
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2a12:5940:5352::2.		IN	A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Mon Jul 08 01:47:56 CST 2024
;; MSG SIZE  rcvd: 46

'
Host info
b'Host 2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.5.3.5.0.4.9.5.2.1.a.2.ip6.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 2a12:5940:5352::2.in-addr.arpa: SERVFAIL
Related comments:
IP Type Details Datetime
81.68.105.55 attackspam
2020-08-11T13:13:04.584972morrigan.ad5gb.com sshd[1313178]: Failed password for root from 81.68.105.55 port 42690 ssh2
2020-08-11T13:13:05.739466morrigan.ad5gb.com sshd[1313178]: Disconnected from authenticating user root 81.68.105.55 port 42690 [preauth]
2020-08-12 02:14:03
139.198.191.217 attackbots
Fail2Ban
2020-08-12 02:16:14
35.240.239.115 attack
35.240.239.115 - - [11/Aug/2020:13:41:03 +0200] "POST /xmlrpc.php HTTP/1.1" 403 207334 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.240.239.115 - - [11/Aug/2020:14:07:21 +0200] "POST /xmlrpc.php HTTP/1.1" 403 10856 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-12 02:23:23
89.40.114.6 attack
Automatic report - Banned IP Access
2020-08-12 02:02:28
222.186.175.216 attackbotsspam
Aug 11 20:06:46 vps sshd[649668]: Failed password for root from 222.186.175.216 port 22706 ssh2
Aug 11 20:06:50 vps sshd[649668]: Failed password for root from 222.186.175.216 port 22706 ssh2
Aug 11 20:06:52 vps sshd[649668]: Failed password for root from 222.186.175.216 port 22706 ssh2
Aug 11 20:06:56 vps sshd[649668]: Failed password for root from 222.186.175.216 port 22706 ssh2
Aug 11 20:06:59 vps sshd[649668]: Failed password for root from 222.186.175.216 port 22706 ssh2
...
2020-08-12 02:08:50
124.156.55.167 attackspambots
[Thu Jul 02 12:49:19 2020] - DDoS Attack From IP: 124.156.55.167 Port: 46640
2020-08-12 01:56:01
180.76.233.250 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.233.250  user=root
Failed password for root from 180.76.233.250 port 44652 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.233.250  user=root
Failed password for root from 180.76.233.250 port 47952 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.233.250  user=root
2020-08-12 02:32:27
87.246.7.142 attack
Aug 11 19:57:57 relay postfix/smtpd\[10951\]: warning: unknown\[87.246.7.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 11 19:58:14 relay postfix/smtpd\[10939\]: warning: unknown\[87.246.7.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 11 19:58:30 relay postfix/smtpd\[10952\]: warning: unknown\[87.246.7.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 11 19:58:48 relay postfix/smtpd\[10952\]: warning: unknown\[87.246.7.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 11 19:59:05 relay postfix/smtpd\[13054\]: warning: unknown\[87.246.7.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-12 02:18:45
164.90.151.183 attackspambots
Brute forcing email accounts
2020-08-12 02:13:35
118.25.103.178 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-08-12 02:32:41
188.166.38.40 attackspambots
Attempted WordPress login: "GET /wp-login.php"
2020-08-12 02:10:49
46.146.222.134 attackbots
Aug 11 13:59:36 inter-technics sshd[30885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.146.222.134  user=root
Aug 11 13:59:37 inter-technics sshd[30885]: Failed password for root from 46.146.222.134 port 50866 ssh2
Aug 11 14:03:39 inter-technics sshd[31124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.146.222.134  user=root
Aug 11 14:03:41 inter-technics sshd[31124]: Failed password for root from 46.146.222.134 port 34160 ssh2
Aug 11 14:07:42 inter-technics sshd[31469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.146.222.134  user=root
Aug 11 14:07:44 inter-technics sshd[31469]: Failed password for root from 46.146.222.134 port 45402 ssh2
...
2020-08-12 02:11:22
222.188.54.23 attackbotsspam
Aug 11 13:44:54 venus sshd[24679]: Invalid user osboxes from 222.188.54.23 port 22019
Aug 11 13:44:55 venus sshd[24679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.188.54.23
Aug 11 13:44:57 venus sshd[24679]: Failed password for invalid user osboxes from 222.188.54.23 port 22019 ssh2
Aug 11 13:45:34 venus sshd[24741]: Invalid user support from 222.188.54.23 port 24958
Aug 11 13:45:35 venus sshd[24741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.188.54.23
Aug 11 13:45:37 venus sshd[24741]: Failed password for invalid user support from 222.188.54.23 port 24958 ssh2
Aug 11 13:46:11 venus sshd[24837]: Invalid user NetLinx from 222.188.54.23 port 27609
Aug 11 13:46:13 venus sshd[24837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.188.54.23
Aug 11 13:46:15 venus sshd[24837]: Failed password for invalid user NetLinx from 222.188.54.23........
------------------------------
2020-08-12 02:20:28
3.93.52.203 attackspam
Fail2Ban Ban Triggered
SMTP Abuse Attempt
2020-08-12 02:01:39
178.128.157.71 attackspam
*Port Scan* detected from 178.128.157.71 (US/United States/New Jersey/North Bergen/-). 4 hits in the last 70 seconds
2020-08-12 02:26:13

Recently Reported IPs

166.1.131.37 78.153.130.62 146.19.253.250 146.196.122.252
178.128.103.58 223.72.29.20 23.225.172.174 125.195.25.4
144.76.22.44 23.225.172.166 45.191.99.235 116.30.120.119
116.30.123.178 243.90.45.221 47.164.20.137 125.56.201.112
23.77.204.169 23.46.155.36 255.113.6.84 218.102.129.159