Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nürnberg

Region: Bayern

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
5.45.99.16 attackbots
Failed password for invalid user king from 5.45.99.16 port 36158 ssh2
2020-05-26 14:15:56
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '5.45.96.0 - 5.45.99.255'

% Abuse contact for '5.45.96.0 - 5.45.99.255' is 'abuse@netcup.de'

inetnum:        5.45.96.0 - 5.45.99.255
netname:        NETCUP_NET-8
org:            ORG-nG51-RIPE
descr:          netcup GmbH
country:        DE
admin-c:        OW395-RIPE
tech-c:         OW395-RIPE
status:         ASSIGNED PA
remarks:        INFRA-AW
mnt-by:         NETCUP-MNT
created:        2013-09-25T08:50:03Z
last-modified:  2013-09-25T08:54:17Z
source:         RIPE

organisation:   ORG-nG51-RIPE
org-name:       netcup GmbH
country:        DE
org-type:       LIR
address:        Emmy-Noether-Strae-10
address:        76131
address:        Karlsruhe
address:        GERMANY
phone:          +4972175407550
fax-no:         +4972175407559
reg-nr:         District court Mannheim HRB 705547
admin-c:        OW395-RIPE
abuse-c:        NA4042-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        NETCUP-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         NETCUP-MNT
created:        2010-11-03T10:05:19Z
last-modified:  2026-04-29T05:03:29Z
source:         RIPE # Filtered

person:         Oliver Werner
address:        netcup GmbH
address:        Daimlerstrasse 25
address:        76185 Karlsruhe
phone:          +49721 75407550
nic-hdl:        OW395-RIPE
mnt-by:         NETCUP-MNT
created:        2010-11-03T14:34:38Z
last-modified:  2017-10-30T22:11:28Z
source:         RIPE # Filtered

% Information related to '5.45.96.0/20AS197540'

route:          5.45.96.0/20
descr:          NETCUP-GMBH
origin:         AS197540
mnt-by:         NETCUP-MNT
created:        2013-05-15T11:10:09Z
last-modified:  2013-05-15T11:10:09Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.122 (ABERDEEN)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.45.99.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30070
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.45.99.158.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050500 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 05 18:30:58 CST 2026
;; MSG SIZE  rcvd: 104
Host info
158.99.45.5.in-addr.arpa domain name pointer v2202507290064367794.goodsrv.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
158.99.45.5.in-addr.arpa	name = v2202507290064367794.goodsrv.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.128.74.234 attackspam
Invalid user jader from 178.128.74.234 port 60006
2019-08-03 08:22:09
54.36.108.162 attackbots
2019-08-02T21:39:37.881921mizuno.rwx.ovh sshd[19964]: Connection from 54.36.108.162 port 39365 on 78.46.61.178 port 22
2019-08-02T21:39:38.970333mizuno.rwx.ovh sshd[19964]: Invalid user NetLinx from 54.36.108.162 port 39365
2019-08-02T21:39:38.981408mizuno.rwx.ovh sshd[19964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.108.162
2019-08-02T21:39:37.881921mizuno.rwx.ovh sshd[19964]: Connection from 54.36.108.162 port 39365 on 78.46.61.178 port 22
2019-08-02T21:39:38.970333mizuno.rwx.ovh sshd[19964]: Invalid user NetLinx from 54.36.108.162 port 39365
2019-08-02T21:39:40.585981mizuno.rwx.ovh sshd[19964]: Failed password for invalid user NetLinx from 54.36.108.162 port 39365 ssh2
...
2019-08-03 08:45:23
128.199.219.121 attack
SSH Bruteforce @ SigaVPN honeypot
2019-08-03 08:28:37
177.158.84.124 attackspambots
Automatic report - Port Scan Attack
2019-08-03 08:33:43
45.79.1.161 attack
Honeypot attack, port: 135, PTR: min-li-jp-07-30-41672-v-prod.binaryedge.ninja.
2019-08-03 08:36:43
177.99.190.122 attack
Aug  3 00:16:41 lnxded63 sshd[18941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.99.190.122
2019-08-03 08:41:35
189.7.129.60 attackspambots
Aug  2 21:47:38 XXX sshd[7410]: Invalid user hannah from 189.7.129.60 port 47180
2019-08-03 08:08:01
80.211.94.29 attackspambots
FTP: login Brute Force attempt, PTR: host29-94-211-80.serverdedicati.aruba.it.
2019-08-03 08:32:54
177.101.255.26 attackbotsspam
Aug  2 21:01:49 mail sshd\[30604\]: Failed password for invalid user uno85 from 177.101.255.26 port 46206 ssh2
Aug  2 21:18:23 mail sshd\[30862\]: Invalid user rocco from 177.101.255.26 port 40168
...
2019-08-03 08:52:00
108.178.61.59 attackspambots
3389BruteforceFW22
2019-08-03 08:49:31
157.122.179.120 attack
Aug  3 03:23:29 localhost sshd[31490]: Invalid user webdata from 157.122.179.120 port 58313
Aug  3 03:23:29 localhost sshd[31490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.122.179.120
Aug  3 03:23:29 localhost sshd[31490]: Invalid user webdata from 157.122.179.120 port 58313
Aug  3 03:23:31 localhost sshd[31490]: Failed password for invalid user webdata from 157.122.179.120 port 58313 ssh2
...
2019-08-03 08:42:38
178.17.171.102 attackbots
2019-08-02T15:24:04.782101WS-Zach sshd[25983]: User root from 178.17.171.102 not allowed because none of user's groups are listed in AllowGroups
2019-08-02T15:24:08.400558WS-Zach sshd[26016]: User root from 178.17.171.102 not allowed because none of user's groups are listed in AllowGroups
2019-08-02T15:24:08.411547WS-Zach sshd[26016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.17.171.102  user=root
2019-08-02T15:24:08.400558WS-Zach sshd[26016]: User root from 178.17.171.102 not allowed because none of user's groups are listed in AllowGroups
2019-08-02T15:24:10.588988WS-Zach sshd[26016]: Failed password for invalid user root from 178.17.171.102 port 60372 ssh2
...
2019-08-03 08:14:19
148.70.63.163 attack
Aug  3 02:08:17 localhost sshd\[22981\]: Invalid user git from 148.70.63.163 port 56062
Aug  3 02:08:17 localhost sshd\[22981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.63.163
Aug  3 02:08:18 localhost sshd\[22981\]: Failed password for invalid user git from 148.70.63.163 port 56062 ssh2
2019-08-03 08:19:31
165.227.220.178 attackspam
2019-08-02T22:07:33.488455abusebot-8.cloudsearch.cf sshd\[24042\]: Invalid user 123456 from 165.227.220.178 port 42424
2019-08-03 08:17:41
108.178.61.58 attackspambots
3389BruteforceFW22
2019-08-03 08:45:51

Recently Reported IPs

2606:4700:10::6816:996 143.198.42.177 188.253.123.159 2606:4700:10::6814:9619
162.14.109.170 212.73.217.80 206.189.222.117 2606:4700:10::6816:204
38.98.22.80 210.129.212.51 216.162.44.10 20.169.91.108
172.86.69.91 2606:4700:10::6816:1219 164.155.74.93 178.172.123.41
10.9.152.163 2606:4700:10::6814:4530 172.150.162.111 253.101.141.136