Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bad Lobenstein

Region: Thuringia

Country: Germany

Internet Service Provider: Vodafone Kabel Deutschland GmbH

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
Mar  1 18:51:34 gw1 sshd[7919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.52.214.123
Mar  1 18:51:36 gw1 sshd[7919]: Failed password for invalid user gameserver from 146.52.214.123 port 57436 ssh2
...
2020-03-02 00:55:38
attack
Feb 25 20:37:16 MK-Soft-VM3 sshd[25288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.52.214.123 
Feb 25 20:37:18 MK-Soft-VM3 sshd[25288]: Failed password for invalid user quantum from 146.52.214.123 port 40314 ssh2
...
2020-02-26 07:34:17
attackbots
Feb 24 07:06:46 odroid64 sshd\[27497\]: Invalid user support from 146.52.214.123
Feb 24 07:06:46 odroid64 sshd\[27497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.52.214.123
...
2020-02-24 15:35:46
attack
Feb 23 01:06:29 gw1 sshd[16690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.52.214.123
Feb 23 01:06:30 gw1 sshd[16690]: Failed password for invalid user tc from 146.52.214.123 port 48108 ssh2
...
2020-02-23 04:28:10
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.52.214.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32297
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;146.52.214.123.			IN	A

;; AUTHORITY SECTION:
.			586	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022200 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 04:28:05 CST 2020
;; MSG SIZE  rcvd: 118
Host info
123.214.52.146.in-addr.arpa domain name pointer ip9234d67b.dynamic.kabel-deutschland.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
123.214.52.146.in-addr.arpa	name = ip9234d67b.dynamic.kabel-deutschland.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.255.35.41 attack
Unauthorized connection attempt detected from IP address 51.255.35.41 to port 2220 [J]
2020-01-18 04:12:46
104.168.237.171 attackbots
$f2bV_matches
2020-01-18 04:07:32
222.223.32.228 attackspam
Unauthorized connection attempt detected from IP address 222.223.32.228 to port 2220 [J]
2020-01-18 03:55:02
112.140.185.64 attackspambots
Jan 17 20:50:47 * sshd[11216]: Failed password for backup from 112.140.185.64 port 55704 ssh2
2020-01-18 04:05:16
80.178.115.146 attackbotsspam
Invalid user corte from 80.178.115.146 port 60899
2020-01-18 04:10:26
212.51.148.162 attackbots
Invalid user justin from 212.51.148.162 port 46743
2020-01-18 03:56:38
106.13.239.120 attack
Unauthorized connection attempt detected from IP address 106.13.239.120 to port 2220 [J]
2020-01-18 03:46:18
5.135.185.27 attackbotsspam
SSH Brute-Force reported by Fail2Ban
2020-01-18 04:16:30
189.6.120.131 attackspambots
Jan 17 20:54:35 vpn01 sshd[29789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.6.120.131
Jan 17 20:54:37 vpn01 sshd[29789]: Failed password for invalid user omega from 189.6.120.131 port 5009 ssh2
...
2020-01-18 03:58:29
14.250.122.233 attackspambots
Invalid user avanthi from 14.250.122.233 port 56662
2020-01-18 03:53:08
107.175.87.115 attackspambots
Invalid user admin from 107.175.87.115 port 37431
2020-01-18 03:45:09
106.13.67.90 attackspambots
ssh failed login
2020-01-18 03:46:30
103.1.209.245 attackbots
Unauthorized connection attempt detected from IP address 103.1.209.245 to port 2220 [J]
2020-01-18 03:48:36
5.29.191.195 attack
Unauthorized connection attempt detected from IP address 5.29.191.195 to port 2220 [J]
2020-01-18 03:53:52
78.139.216.117 attack
Invalid user tmp from 78.139.216.117 port 60690
2020-01-18 04:10:40

Recently Reported IPs

133.202.161.105 162.243.135.56 221.61.178.146 115.133.224.71
142.129.163.88 36.213.36.63 93.226.156.230 205.232.63.226
111.10.7.199 192.241.220.219 60.179.70.8 111.45.5.35
185.215.151.205 71.211.170.176 162.243.134.66 51.223.9.41
54.150.83.196 37.145.224.0 112.84.95.244 77.195.140.192