Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Greece

Internet Service Provider: Vodafone-Panafon Hellenic Telecommunications Company SA

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/5.54.3.13/ 
 
 GR - 1H : (61)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : GR 
 NAME ASN : ASN3329 
 
 IP : 5.54.3.13 
 
 CIDR : 5.54.0.0/19 
 
 PREFIX COUNT : 167 
 
 UNIQUE IP COUNT : 788480 
 
 
 ATTACKS DETECTED ASN3329 :  
  1H - 1 
  3H - 3 
  6H - 6 
 12H - 9 
 24H - 27 
 
 DateTime : 2019-11-03 06:29:22 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-03 13:57:56
Comments on same subnet:
IP Type Details Datetime
5.54.32.254 attack
Hits on port : 23
2020-09-10 20:24:28
5.54.32.254 attackspambots
Hits on port : 23
2020-09-10 12:14:16
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.54.3.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62147
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.54.3.13.			IN	A

;; AUTHORITY SECTION:
.			445	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110201 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 03 13:57:53 CST 2019
;; MSG SIZE  rcvd: 113
Host info
13.3.54.5.in-addr.arpa domain name pointer ppp005054003013.access.hol.gr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.3.54.5.in-addr.arpa	name = ppp005054003013.access.hol.gr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.125.159 attack
Invalid user armond from 106.13.125.159 port 57858
2019-11-22 14:24:28
167.86.115.153 attackbots
Nov 22 05:49:26 www_kotimaassa_fi sshd[14913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.115.153
Nov 22 05:49:28 www_kotimaassa_fi sshd[14913]: Failed password for invalid user ricciardi from 167.86.115.153 port 36846 ssh2
...
2019-11-22 13:54:28
195.142.107.163 attackspam
" "
2019-11-22 14:13:49
51.81.3.128 attack
Port scan on 3 port(s): 2375 2376 4243
2019-11-22 14:07:36
200.236.118.147 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 14:01:29
192.144.132.172 attackspam
Nov 22 06:18:30 lnxmysql61 sshd[23192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.132.172
Nov 22 06:18:30 lnxmysql61 sshd[23192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.132.172
2019-11-22 13:58:41
60.245.37.89 attack
Unauthorized connection attempt from IP address 60.245.37.89 on Port 445(SMB)
2019-11-22 14:43:23
186.225.153.227 attack
fail2ban honeypot
2019-11-22 14:16:51
218.92.0.181 attackbotsspam
Nov 22 07:54:55 server sshd\[8779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.181  user=root
Nov 22 07:54:57 server sshd\[8779\]: Failed password for root from 218.92.0.181 port 46192 ssh2
Nov 22 07:54:57 server sshd\[8793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.181  user=root
Nov 22 07:55:00 server sshd\[8793\]: Failed password for root from 218.92.0.181 port 40894 ssh2
Nov 22 07:55:00 server sshd\[8779\]: Failed password for root from 218.92.0.181 port 46192 ssh2
...
2019-11-22 14:22:38
112.84.91.229 attackspambots
Brute force SMTP login attempts.
2019-11-22 14:02:38
187.167.203.162 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 14:05:50
49.233.46.219 attackspam
Nov 22 07:29:58 dedicated sshd[15570]: Invalid user pittges from 49.233.46.219 port 56744
2019-11-22 14:45:54
197.45.155.12 attack
Invalid user vasselin from 197.45.155.12 port 37827
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.45.155.12
Failed password for invalid user vasselin from 197.45.155.12 port 37827 ssh2
Invalid user rollans from 197.45.155.12 port 55682
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.45.155.12
2019-11-22 14:20:24
149.56.177.248 attackspam
F2B jail: sshd. Time: 2019-11-22 07:29:59, Reported by: VKReport
2019-11-22 14:44:12
71.40.139.186 attackbots
Automatic report - Banned IP Access
2019-11-22 14:11:37

Recently Reported IPs

74.221.63.35 99.209.254.26 197.149.224.154 32.4.193.68
73.93.10.208 163.217.12.187 197.12.27.201 54.252.213.148
16.251.173.56 172.6.143.208 82.55.69.50 136.56.0.30
13.52.125.12 27.64.96.178 88.217.80.89 24.160.26.124
106.12.8.249 87.234.172.251 1.55.14.228 62.238.167.93