Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Vilnius

Region: Vilnius

Country: Lithuania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
5.20.131.6 attackspam
Nov  8 17:13:18 aragorn sshd[10228]: User sshd from data-131-6.cgates.lt not allowed because not listed in AllowUsers
Nov  8 17:15:31 aragorn sshd[11124]: User sshd from data-131-6.cgates.lt not allowed because not listed in AllowUsers
Nov  8 17:15:45 aragorn sshd[11129]: User sshd from data-131-6.cgates.lt not allowed because not listed in AllowUsers
Nov  8 17:38:14 aragorn sshd[14749]: Invalid user user1 from 5.20.131.6
...
2019-11-09 08:14:13
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '5.20.128.0 - 5.20.223.255'

% Abuse contact for '5.20.128.0 - 5.20.223.255' is 'abuse@cgates.lt'

inetnum:        5.20.128.0 - 5.20.223.255
netname:        LT-CGATES
descr:          Cgates, UAB
descr:          Internet services
country:        LT
admin-c:        CG6399-RIPE
tech-c:         CG6399-RIPE
status:         ASSIGNED PA
mnt-by:         CGATES-LT
mnt-lower:      CGATES-LT
mnt-routes:     CGATES-LT
org:            ORG-UKRT1-RIPE
created:        2012-05-04T17:18:14Z
last-modified:  2012-05-04T17:18:14Z
source:         RIPE

organisation:   ORG-UKRT1-RIPE
org-name:       UAB "Cgates"
country:        LT
org-type:       LIR
address:        Ukmerges st. 120
address:        LT-08105
address:        Vilnius
address:        LITHUANIA
phone:          +37052150000
fax-no:         +37052137799
admin-c:        MS41406-RIPE
tech-c:         CG6399-RIPE
abuse-c:        CNA24-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        CGATES-LT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         CGATES-LT
created:        2004-04-17T11:37:12Z
last-modified:  2020-12-16T12:24:41Z
source:         RIPE # Filtered

person:         Cgates NOC
address:        Cgates UAB
address:        Ukmerges g. 120
address:        LT-08105 Vilnius, Lithuania
phone:          +370 5 215 0000
nic-hdl:        CG6399-RIPE
mnt-by:         CGATES-LT
created:        2012-05-03T07:42:59Z
last-modified:  2018-10-31T11:34:42Z
source:         RIPE # Filtered

% Information related to '5.20.128.0/19AS21412'

route:          5.20.128.0/19
descr:          CGATES-LT
origin:         AS21412
mnt-by:         CGATES-LT
created:        2012-05-04T17:33:47Z
last-modified:  2012-05-04T17:33:47Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.20.131.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.20.131.166.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032002 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 13:19:44 CST 2026
;; MSG SIZE  rcvd: 105
Host info
166.131.20.5.in-addr.arpa domain name pointer data-131-166.cgates.lt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
166.131.20.5.in-addr.arpa	name = data-131-166.cgates.lt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
18.224.72.113 attackspam
Jul 25 01:00:15 host sshd\[19842\]: Invalid user oo from 18.224.72.113 port 54604
Jul 25 01:00:17 host sshd\[19842\]: Failed password for invalid user oo from 18.224.72.113 port 54604 ssh2
...
2019-07-25 07:22:04
61.162.214.126 attackbotsspam
61.162.214.126 - - [24/Jul/2019:18:35:34 +0200] "GET /plus/bookfeedback.php HTTP/1.1" 302 535
...
2019-07-25 07:15:05
189.135.198.242 attackspam
Automatic report - Port Scan Attack
2019-07-25 07:15:56
201.234.253.3 attackspambots
Jul 24 10:34:02 mail postfix/postscreen[93611]: PREGREET 41 after 1.7 from [201.234.253.3]:56109: EHLO 201-234-253-3.static.impsat.net.ar

...
2019-07-25 07:36:53
187.112.148.225 attack
Automatic report - Port Scan Attack
2019-07-25 07:37:29
41.41.77.39 attackbotsspam
Automatic report - Port Scan Attack
2019-07-25 07:28:22
210.176.100.37 attack
Automatic report - Banned IP Access
2019-07-25 07:23:57
185.176.26.101 attackbots
Splunk® : port scan detected:
Jul 24 18:53:42 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:c0:42:d0:39:2c:30:08:00 SRC=185.176.26.101 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=38198 PROTO=TCP SPT=41515 DPT=7079 WINDOW=1024 RES=0x00 SYN URGP=0
2019-07-25 07:07:31
112.85.42.182 attackspambots
2019-07-24T22:47:04.020705abusebot-3.cloudsearch.cf sshd\[7833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.182  user=root
2019-07-25 07:11:33
178.148.12.229 attackspambots
Attack : GET /TP/public/index.php
2019-07-25 07:38:31
198.108.67.104 attackbots
" "
2019-07-25 07:27:22
117.66.243.77 attack
Feb 20 12:53:43 vtv3 sshd\[28811\]: Invalid user tomcat from 117.66.243.77 port 37634
Feb 20 12:53:43 vtv3 sshd\[28811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.66.243.77
Feb 20 12:53:45 vtv3 sshd\[28811\]: Failed password for invalid user tomcat from 117.66.243.77 port 37634 ssh2
Feb 20 13:01:21 vtv3 sshd\[31245\]: Invalid user ftptest from 117.66.243.77 port 32917
Feb 20 13:01:21 vtv3 sshd\[31245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.66.243.77
Feb 23 22:12:39 vtv3 sshd\[22953\]: Invalid user vagrant from 117.66.243.77 port 47868
Feb 23 22:12:39 vtv3 sshd\[22953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.66.243.77
Feb 23 22:12:41 vtv3 sshd\[22953\]: Failed password for invalid user vagrant from 117.66.243.77 port 47868 ssh2
Feb 23 22:17:55 vtv3 sshd\[24773\]: Invalid user test from 117.66.243.77 port 35849
Feb 23 22:17:55 vtv3 sshd\[24773\]
2019-07-25 07:29:03
132.232.104.106 attackspam
Jul 24 19:14:49 localhost sshd\[16894\]: Invalid user ayub from 132.232.104.106
Jul 24 19:14:49 localhost sshd\[16894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.104.106
Jul 24 19:14:51 localhost sshd\[16894\]: Failed password for invalid user ayub from 132.232.104.106 port 50662 ssh2
Jul 24 19:21:24 localhost sshd\[17423\]: Invalid user gh from 132.232.104.106
Jul 24 19:21:24 localhost sshd\[17423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.104.106
...
2019-07-25 07:14:02
185.175.93.18 attack
firewall-block, port(s): 4923/tcp
2019-07-25 07:31:11
23.238.115.210 attackbots
Automatic report - Banned IP Access
2019-07-25 07:15:26

Recently Reported IPs

131.0.196.149 216.241.190.170 85.253.211.133 247.174.165.208
2606:4700:10::6816:2725 2606:4700:10::6816:3803 2606:4700:10::6814:9350 110.78.158.81
2606:4700:10::6816:441d 2606:4700:10::6814:9878 197.215.74.227 85.208.48.192
2606:4700:10::6816:4229 2606:4700:10::6816:2630 2606:4700:10::ac43:2848 2606:4700:10::6814:6842
2606:4700:10::6816:289 2606:4700:10::ac43:2797 2606:4700:10::6814:9527 2606:4700:10::6814:8223