Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.214.12.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8224
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.214.12.22.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 06:22:41 CST 2025
;; MSG SIZE  rcvd: 104
Host info
22.12.214.2.in-addr.arpa domain name pointer dynamic-002-214-012-022.2.214.pool.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.12.214.2.in-addr.arpa	name = dynamic-002-214-012-022.2.214.pool.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.231.89.162 attackbotsspam
Invalid user tester1 from 111.231.89.162 port 53728
2020-04-21 00:26:27
94.245.94.104 attack
(sshd) Failed SSH login from 94.245.94.104 (IE/Ireland/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 20 18:19:33 amsweb01 sshd[20161]: Invalid user w from 94.245.94.104 port 58628
Apr 20 18:19:35 amsweb01 sshd[20161]: Failed password for invalid user w from 94.245.94.104 port 58628 ssh2
Apr 20 18:31:03 amsweb01 sshd[22071]: User admin from 94.245.94.104 not allowed because not listed in AllowUsers
Apr 20 18:31:03 amsweb01 sshd[22071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.245.94.104  user=admin
Apr 20 18:31:04 amsweb01 sshd[22071]: Failed password for invalid user admin from 94.245.94.104 port 42878 ssh2
2020-04-21 00:37:01
93.115.1.195 attackbots
$f2bV_matches
2020-04-21 00:37:24
109.173.40.60 attackbotsspam
SSH Brute Force
2020-04-21 00:28:50
46.105.50.223 attack
no
2020-04-21 00:59:13
51.77.140.111 attack
Apr 20 16:22:25 localhost sshd[60616]: Invalid user rb from 51.77.140.111 port 40776
Apr 20 16:22:25 localhost sshd[60616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.ip-51-77-140.eu
Apr 20 16:22:25 localhost sshd[60616]: Invalid user rb from 51.77.140.111 port 40776
Apr 20 16:22:28 localhost sshd[60616]: Failed password for invalid user rb from 51.77.140.111 port 40776 ssh2
Apr 20 16:27:19 localhost sshd[60997]: Invalid user po from 51.77.140.111 port 59044
...
2020-04-21 00:53:44
82.148.18.91 attackbotsspam
Invalid user ds from 82.148.18.91 port 33964
2020-04-21 00:43:06
51.68.226.159 attackbotsspam
Invalid user pk from 51.68.226.159 port 56744
2020-04-21 00:54:17
54.38.36.210 attack
Apr 20 14:44:30 XXXXXX sshd[7965]: Invalid user zd from 54.38.36.210 port 54578
2020-04-21 00:50:20
115.112.61.218 attackbots
Invalid user dp from 115.112.61.218 port 58070
2020-04-21 00:24:37
52.138.12.225 attackbots
$f2bV_matches
2020-04-21 00:51:18
109.196.55.45 attackspam
Invalid user tester from 109.196.55.45 port 43082
2020-04-21 00:28:28
91.96.241.235 attack
Invalid user pi from 91.96.241.235 port 53448
2020-04-21 00:41:30
77.70.96.195 attack
Apr 20 16:50:40 Enigma sshd[28576]: Failed password for invalid user ic from 77.70.96.195 port 37746 ssh2
Apr 20 16:52:50 Enigma sshd[28644]: Invalid user vq from 77.70.96.195 port 60808
Apr 20 16:52:50 Enigma sshd[28644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.70.96.195
Apr 20 16:52:50 Enigma sshd[28644]: Invalid user vq from 77.70.96.195 port 60808
Apr 20 16:52:53 Enigma sshd[28644]: Failed password for invalid user vq from 77.70.96.195 port 60808 ssh2
2020-04-21 00:45:19
115.84.92.180 attackspam
Invalid user admin from 115.84.92.180 port 44739
2020-04-21 00:24:58

Recently Reported IPs

65.54.111.194 71.96.186.184 21.169.136.169 168.227.75.99
125.167.90.101 231.248.105.155 230.134.145.123 219.113.106.52
87.22.225.90 198.177.125.14 241.161.1.161 79.239.187.211
195.127.208.0 93.183.233.134 33.249.64.5 175.226.84.80
28.142.35.255 130.3.73.222 246.95.87.253 2.50.76.222