Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bengaluru

Region: Karnataka

Country: India

Internet Service Provider: AirTel

Hostname: unknown

Organization: Bharti Airtel Ltd., Telemedia Services

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
122.166.204.79 attackbots
DATE:2019-10-09 13:35:34, IP:122.166.204.79, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2019-10-09 23:32:35
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.166.204.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15621
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;122.166.204.213.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041400 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Apr 14 22:37:49 +08 2019
;; MSG SIZE  rcvd: 119

Host info
213.204.166.122.in-addr.arpa domain name pointer abts-kk-static-213.204.166.122.airtelbroadband.in.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
213.204.166.122.in-addr.arpa	name = abts-kk-static-213.204.166.122.airtelbroadband.in.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
220.143.30.251 attackspam
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 15:55:07
14.143.107.226 attack
Invalid user mudehwec from 14.143.107.226 port 21947
2020-05-23 15:50:11
185.153.198.240 attack
Port scan on 3 port(s): 15003 15080 15153
2020-05-23 16:21:48
219.139.131.134 attackspambots
May 18 23:21:42 our-server-hostname sshd[4120]: Invalid user rku from 219.139.131.134
May 18 23:21:42 our-server-hostname sshd[4120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.139.131.134 
May 18 23:21:44 our-server-hostname sshd[4120]: Failed password for invalid user rku from 219.139.131.134 port 59266 ssh2
May 18 23:30:53 our-server-hostname sshd[5727]: Invalid user gld from 219.139.131.134
May 18 23:30:53 our-server-hostname sshd[5727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.139.131.134 
May 18 23:30:55 our-server-hostname sshd[5727]: Failed password for invalid user gld from 219.139.131.134 port 54192 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=219.139.131.134
2020-05-23 15:58:58
198.108.67.45 attackbots
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 16:06:39
185.175.93.17 attackspam
05/23/2020-03:33:01.864262 185.175.93.17 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-23 16:20:18
196.221.197.205 attack
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 16:07:46
195.54.160.228 attackbotsspam
Port scan on 3 port(s): 33677 33683 33689
2020-05-23 16:10:49
185.153.199.211 attackbotsspam
firewall-block, port(s): 3389/tcp, 3390/tcp
2020-05-23 16:21:21
222.128.15.208 attack
May 23 03:46:29 Host-KEWR-E sshd[30110]: Disconnected from invalid user tmq 222.128.15.208 port 43472 [preauth]
...
2020-05-23 15:54:13
194.26.25.109 attackspambots
05/23/2020-02:59:28.589030 194.26.25.109 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-23 16:14:43
180.151.61.46 attackspam
Invalid user lfx from 180.151.61.46 port 58284
2020-05-23 16:27:34
219.85.200.90 attackbots
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 15:59:33
195.54.160.211 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 55555 proto: TCP cat: Misc Attack
2020-05-23 16:12:11
176.122.178.228 attack
Invalid user vvu from 176.122.178.228 port 50954
2020-05-23 16:31:02

Recently Reported IPs

113.119.245.233 58.13.52.81 220.191.208.138 61.195.140.153
154.73.109.152 122.96.97.20 113.64.157.223 167.86.85.13
200.54.253.38 128.134.187.167 197.52.77.86 185.80.129.3
206.81.24.64 95.168.125.53 68.183.29.149 114.32.230.189
170.75.242.103 102.115.171.92 168.167.30.198 159.65.86.158