Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.3.201.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33493
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.3.201.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 17:31:42 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 12.201.3.54.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.201.3.54.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
179.108.240.178 attack
$f2bV_matches
2019-07-12 16:24:18
106.12.128.24 attack
Invalid user www from 106.12.128.24 port 39768
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24
Failed password for invalid user www from 106.12.128.24 port 39768 ssh2
Invalid user test from 106.12.128.24 port 34682
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24
2019-07-12 16:24:53
118.25.7.123 attackbotsspam
Jul 12 04:42:19 vps200512 sshd\[13246\]: Invalid user appuser from 118.25.7.123
Jul 12 04:42:19 vps200512 sshd\[13246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.7.123
Jul 12 04:42:21 vps200512 sshd\[13246\]: Failed password for invalid user appuser from 118.25.7.123 port 42964 ssh2
Jul 12 04:48:18 vps200512 sshd\[13418\]: Invalid user web from 118.25.7.123
Jul 12 04:48:18 vps200512 sshd\[13418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.7.123
2019-07-12 16:50:27
180.249.111.77 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 23:40:52,506 INFO [amun_request_handler] PortScan Detected on Port: 445 (180.249.111.77)
2019-07-12 16:31:03
54.193.1.43 attack
Jul 12 10:44:54 mout sshd[20701]: Connection closed by 54.193.1.43 port 51336 [preauth]
Jul 12 10:45:05 mout sshd[20703]: Unable to negotiate with 54.193.1.43 port 41700: no matching host key type found. Their offer: ecdsa-sha2-nistp384 [preauth]
Jul 12 10:45:20 mout sshd[20739]: Unable to negotiate with 54.193.1.43 port 39018: no matching host key type found. Their offer: ecdsa-sha2-nistp521 [preauth]
2019-07-12 16:58:38
113.107.244.124 attackbots
Jul 12 14:17:17 vibhu-HP-Z238-Microtower-Workstation sshd\[30723\]: Invalid user sleepy from 113.107.244.124
Jul 12 14:17:17 vibhu-HP-Z238-Microtower-Workstation sshd\[30723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.107.244.124
Jul 12 14:17:19 vibhu-HP-Z238-Microtower-Workstation sshd\[30723\]: Failed password for invalid user sleepy from 113.107.244.124 port 54548 ssh2
Jul 12 14:23:45 vibhu-HP-Z238-Microtower-Workstation sshd\[333\]: Invalid user test from 113.107.244.124
Jul 12 14:23:45 vibhu-HP-Z238-Microtower-Workstation sshd\[333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.107.244.124
...
2019-07-12 17:06:23
197.50.29.80 attackbots
Brute force attempt
2019-07-12 17:04:37
181.176.35.26 attack
Brute force attempt
2019-07-12 16:20:38
153.36.232.139 attack
Jul 12 10:37:11 * sshd[1078]: Failed password for root from 153.36.232.139 port 56732 ssh2
Jul 12 10:37:13 * sshd[1078]: Failed password for root from 153.36.232.139 port 56732 ssh2
2019-07-12 16:53:37
81.248.73.17 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 23:41:16,561 INFO [amun_request_handler] PortScan Detected on Port: 445 (81.248.73.17)
2019-07-12 16:28:05
139.219.237.253 attack
Jul 12 08:27:07 animalibera sshd[16088]: Invalid user matt from 139.219.237.253 port 1520
...
2019-07-12 16:31:58
116.92.233.140 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-07-12 16:37:31
92.126.222.172 attackspambots
TCP port 993 (IMAP) attempt blocked by hMailServer IP-check. Abuse score 100%
2019-07-12 16:32:46
185.222.211.237 attackspambots
f2b trigger Multiple SASL failures
2019-07-12 16:30:31
41.90.122.21 attackbots
Unauthorized connection attempt from IP address 41.90.122.21 on Port 445(SMB)
2019-07-12 16:23:31

Recently Reported IPs

109.44.141.195 118.200.162.162 80.67.6.221 155.73.81.105
80.110.216.244 188.83.203.160 210.40.191.96 164.43.129.218
194.53.168.252 61.56.145.99 173.123.82.177 185.212.117.186
66.131.0.182 169.225.4.224 184.144.246.137 208.102.252.223
143.173.234.181 172.174.161.85 81.203.168.2 218.87.237.38