Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hungary

Internet Service Provider: Telenor Hungary plc

Hostname: unknown

Organization: unknown

Usage Type: Mobile ISP

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.204.95.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42284
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.204.95.100.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070700 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 07 20:29:53 CST 2019
;; MSG SIZE  rcvd: 116
Host info
100.95.204.5.in-addr.arpa domain name pointer netacc-gpn-204-95-100.pool.telenor.hu.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
100.95.204.5.in-addr.arpa	name = netacc-gpn-204-95-100.pool.telenor.hu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.150.234.65 attack
postfix (unknown user, SPF fail or relay access denied)
2019-11-30 21:53:29
77.70.96.195 attackspam
Invalid user bommer from 77.70.96.195 port 59714
2019-11-30 21:41:30
43.229.95.56 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-30 21:25:33
103.58.250.137 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-30 21:56:47
175.158.44.83 attackspam
Exploit Attempt
2019-11-30 21:42:17
43.243.75.14 attackbotsspam
Nov 30 12:42:23 work-partkepr sshd\[25587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.75.14  user=root
Nov 30 12:42:25 work-partkepr sshd\[25587\]: Failed password for root from 43.243.75.14 port 48996 ssh2
...
2019-11-30 21:40:03
112.85.42.94 attackbots
Nov 30 13:37:03 game-panel sshd[5949]: Failed password for root from 112.85.42.94 port 60321 ssh2
Nov 30 13:37:39 game-panel sshd[5968]: Failed password for root from 112.85.42.94 port 15739 ssh2
2019-11-30 21:44:02
23.91.101.216 attackspambots
Invalid user ftpuser from 23.91.101.216 port 34802
2019-11-30 21:29:21
109.117.87.64 attackbots
19/11/30@05:02:40: FAIL: IoT-Telnet address from=109.117.87.64
...
2019-11-30 21:55:43
164.132.225.151 attack
Invalid user deanda from 164.132.225.151 port 59739
2019-11-30 21:24:57
42.116.32.109 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-11-30 21:27:27
188.164.199.196 attack
188.164.199.196 - - [30/Nov/2019:07:18:15 +0100] "GET /_adminer HTTP/1.1" 404 17160 "http://nfsec.pl/_adminer" "Go-http-client/1.1"
188.164.199.196 - - [30/Nov/2019:07:18:19 +0100] "GET /_adminer.php HTTP/1.1" 404 17042 "http://nfsec.pl/_adminer.php" "Go-http-client/1.1"
188.164.199.196 - - [30/Nov/2019:07:18:21 +0100] "GET /ad.php HTTP/1.1" 404 17023 "http://nfsec.pl/ad.php" "Go-http-client/1.1"
188.164.199.196 - - [30/Nov/2019:07:18:25 +0100] "GET /adm.php HTTP/1.1" 404 17095 "http://nfsec.pl/adm.php" "Go-http-client/1.1"
188.164.199.196 - - [30/Nov/2019:07:18:30 +0100] "GET /adminer HTTP/1.1" 404 17128 "http://nfsec.pl/adminer" "Go-http-client/1.1"
...
2019-11-30 21:39:19
181.65.164.179 attackspambots
Invalid user elisangela from 181.65.164.179 port 54910
2019-11-30 22:06:11
201.26.61.145 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-11-30 21:37:08
113.179.133.34 attackbots
Unauthorised access (Nov 30) SRC=113.179.133.34 LEN=52 TTL=116 ID=11270 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-30 21:59:57

Recently Reported IPs

192.168.1.177 157.55.39.128 111.206.198.104 220.181.108.185
112.206.183.230 175.150.222.230 181.120.7.92 121.183.67.111
200.23.226.213 124.243.198.190 144.217.190.197 177.189.30.101
84.242.132.114 201.150.88.114 196.176.181.32 77.48.29.70
72.227.226.231 62.173.139.203 185.162.235.62 103.229.126.169