Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ternopil

Region: Ternopil'

Country: Ukraine

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '5.58.128.0 - 5.58.255.255'

% Abuse contact for '5.58.128.0 - 5.58.255.255' is 'noc@columbus.in.ua'

inetnum:        5.58.128.0 - 5.58.255.255
netname:        UA-TE-COLUMBUS-PE
country:        UA
geoloc:         49.566 25.6
admin-c:        CN4593-RIPE
tech-c:         CN4593-RIPE
abuse-c:        CN4593-RIPE
status:         ASSIGNED PA
mnt-by:         MAXIMFS-MNT
created:        2024-02-22T12:05:16Z
last-modified:  2024-02-22T12:05:16Z
source:         RIPE # Filtered

role:           COLUMBUS NOC
address:        Ukraine, Ternopil, Kyivska st. 2
nic-hdl:        CN4593-RIPE
admin-c:        MV14104-RIPE
tech-c:         SMF-RIPE
tech-c:         KG17779-RIPE
tech-c:         MV14104-RIPE
abuse-mailbox:  noc@columbus.in.ua
phone:          +380 352 407407
mnt-by:         MAXIMFS-MNT
created:        2019-05-17T12:46:32Z
last-modified:  2024-02-22T12:17:52Z
source:         RIPE # Filtered

% Information related to '5.58.128.0/18AS16223'

route:          5.58.128.0/18
descr:          ISP Columbus, More Specific Route
origin:         AS16223
mnt-by:         MAXIMFS-MNT
created:        2024-08-12T21:32:06Z
last-modified:  2024-08-12T21:32:06Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121 (ABERDEEN)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.58.188.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.58.188.220.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031501 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 11:32:33 CST 2026
;; MSG SIZE  rcvd: 105
Host info
b'220.188.58.5.in-addr.arpa domain name pointer host-5-58-188-220.bitternet.ua.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
220.188.58.5.in-addr.arpa	name = host-5-58-188-220.bitternet.ua.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
141.98.9.161 attack
Jul 13 05:24:59 scw-tender-jepsen sshd[2460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161
Jul 13 05:25:02 scw-tender-jepsen sshd[2460]: Failed password for invalid user admin from 141.98.9.161 port 34021 ssh2
2020-07-13 13:46:55
202.152.1.67 attackspambots
(sshd) Failed SSH login from 202.152.1.67 (ID/Indonesia/gapura.idola.net.id): 5 in the last 3600 secs
2020-07-13 13:46:08
111.229.103.67 attackbotsspam
Jul 13 07:09:18 lnxmail61 sshd[31050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.103.67
2020-07-13 13:39:17
159.65.84.164 attackbotsspam
2020-07-13T05:32:40.643412shield sshd\[29665\]: Invalid user news from 159.65.84.164 port 56596
2020-07-13T05:32:40.652735shield sshd\[29665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.84.164
2020-07-13T05:32:42.205177shield sshd\[29665\]: Failed password for invalid user news from 159.65.84.164 port 56596 ssh2
2020-07-13T05:35:36.953796shield sshd\[29719\]: Invalid user mustafa from 159.65.84.164 port 51328
2020-07-13T05:35:36.962794shield sshd\[29719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.84.164
2020-07-13 13:52:18
192.35.168.199 attack
GET - / | Other - -
2020-07-13 14:00:43
190.64.135.122 attackspambots
Jul 12 23:54:56 mail sshd\[21985\]: Invalid user rustserver from 190.64.135.122
Jul 12 23:54:56 mail sshd\[21985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.135.122
...
2020-07-13 13:28:13
79.41.47.50 attackspam
SSH invalid-user multiple login try
2020-07-13 13:26:05
193.56.28.176 attackbotsspam
SASL broute force
2020-07-13 14:15:19
95.181.172.188 attackspambots
 TCP (SYN) 95.181.172.188:48104 -> port 3389, len 44
2020-07-13 14:24:27
111.229.136.177 attackbotsspam
ssh brute force
2020-07-13 14:21:46
185.39.11.105 attackspam
 TCP (SYN) 185.39.11.105:60280 -> port 8080, len 44
2020-07-13 14:13:51
51.77.137.211 attack
Invalid user debian from 51.77.137.211 port 60492
2020-07-13 13:47:55
87.197.142.112 attackspam
Jul 13 07:47:47 lnxmail61 sshd[4075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.197.142.112
Jul 13 07:47:47 lnxmail61 sshd[4075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.197.142.112
Jul 13 07:47:49 lnxmail61 sshd[4075]: Failed password for invalid user br from 87.197.142.112 port 57563 ssh2
2020-07-13 14:06:20
222.186.30.167 attackbots
Jul 13 07:23:30 * sshd[30597]: Failed password for root from 222.186.30.167 port 16525 ssh2
2020-07-13 13:29:30
207.244.247.76 attack
Port scan denied
2020-07-13 14:28:41

Recently Reported IPs

125.71.95.113 36.4.62.179 39.144.137.113 39.144.137.146
175.1.127.226 172.23.128.23 64.76.116.87 205.169.39.93
176.120.22.42 220.154.136.8 185.240.17.176 113.108.88.189
110.242.69.21 10.1.236.102 195.178.110.158 98.97.51.123
167.174.195.170 34.206.76.135 85.217.149.19 10.15.114.102