Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.214.99.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29583
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.214.99.111.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 18:16:19 CST 2025
;; MSG SIZE  rcvd: 105
Host info
111.99.214.2.in-addr.arpa domain name pointer dynamic-002-214-099-111.2.214.pool.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
111.99.214.2.in-addr.arpa	name = dynamic-002-214-099-111.2.214.pool.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.226.167.212 attackbots
Fail2Ban - SSH Bruteforce Attempt
2019-12-04 18:53:37
51.75.246.176 attackbots
Dec  4 07:58:17 meumeu sshd[4251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.246.176 
Dec  4 07:58:20 meumeu sshd[4251]: Failed password for invalid user shang from 51.75.246.176 port 36340 ssh2
Dec  4 08:03:52 meumeu sshd[5548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.246.176 
...
2019-12-04 19:05:09
89.219.10.52 attack
SMB Server BruteForce Attack
2019-12-04 18:43:06
106.12.106.78 attackspam
$f2bV_matches
2019-12-04 18:57:42
54.221.88.112 attackbotsspam
Port scan
2019-12-04 18:52:50
213.6.8.38 attack
2019-12-04T10:31:23.651649shield sshd\[22021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.8.38  user=root
2019-12-04T10:31:25.610633shield sshd\[22021\]: Failed password for root from 213.6.8.38 port 50717 ssh2
2019-12-04T10:40:42.990823shield sshd\[24505\]: Invalid user  from 213.6.8.38 port 55885
2019-12-04T10:40:42.995134shield sshd\[24505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.8.38
2019-12-04T10:40:44.697652shield sshd\[24505\]: Failed password for invalid user  from 213.6.8.38 port 55885 ssh2
2019-12-04 18:55:36
68.183.155.33 attackbotsspam
Dec  4 11:05:55 Ubuntu-1404-trusty-64-minimal sshd\[31784\]: Invalid user knorpp from 68.183.155.33
Dec  4 11:05:55 Ubuntu-1404-trusty-64-minimal sshd\[31784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.155.33
Dec  4 11:05:56 Ubuntu-1404-trusty-64-minimal sshd\[31784\]: Failed password for invalid user knorpp from 68.183.155.33 port 47480 ssh2
Dec  4 11:12:59 Ubuntu-1404-trusty-64-minimal sshd\[8789\]: Invalid user harpel from 68.183.155.33
Dec  4 11:12:59 Ubuntu-1404-trusty-64-minimal sshd\[8789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.155.33
2019-12-04 18:50:09
68.198.78.8 attackspambots
Automatic report - Port Scan Attack
2019-12-04 18:58:43
60.29.241.2 attackspambots
Dec  4 11:26:55 OPSO sshd\[9399\]: Invalid user info from 60.29.241.2 port 13292
Dec  4 11:26:55 OPSO sshd\[9399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.29.241.2
Dec  4 11:26:58 OPSO sshd\[9399\]: Failed password for invalid user info from 60.29.241.2 port 13292 ssh2
Dec  4 11:35:01 OPSO sshd\[11152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.29.241.2  user=backup
Dec  4 11:35:03 OPSO sshd\[11152\]: Failed password for backup from 60.29.241.2 port 37328 ssh2
2019-12-04 18:38:26
157.230.208.92 attackspam
SSH bruteforce
2019-12-04 18:39:44
58.120.245.162 attack
3389BruteforceFW22
2019-12-04 19:03:54
94.177.252.51 attackbotsspam
Dec  4 11:27:26 MK-Soft-Root2 sshd[21365]: Failed password for root from 94.177.252.51 port 42726 ssh2
...
2019-12-04 18:42:38
104.54.180.97 attackbots
2019-12-04T10:20:27.459478abusebot-8.cloudsearch.cf sshd\[26643\]: Invalid user noel from 104.54.180.97 port 38392
2019-12-04T10:20:27.464090abusebot-8.cloudsearch.cf sshd\[26643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104-54-180-97.lightspeed.irvnca.sbcglobal.net
2019-12-04 18:40:34
148.70.223.115 attackbotsspam
Dec  4 00:40:21 kapalua sshd\[24411\]: Invalid user cirros from 148.70.223.115
Dec  4 00:40:21 kapalua sshd\[24411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.115
Dec  4 00:40:23 kapalua sshd\[24411\]: Failed password for invalid user cirros from 148.70.223.115 port 36092 ssh2
Dec  4 00:47:35 kapalua sshd\[25045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.115  user=root
Dec  4 00:47:38 kapalua sshd\[25045\]: Failed password for root from 148.70.223.115 port 45142 ssh2
2019-12-04 18:57:11
5.135.101.228 attack
2019-12-04T10:00:43.725974centos sshd\[25873\]: Invalid user deutchland from 5.135.101.228 port 42288
2019-12-04T10:00:43.729708centos sshd\[25873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=noxia.org
2019-12-04T10:00:45.719516centos sshd\[25873\]: Failed password for invalid user deutchland from 5.135.101.228 port 42288 ssh2
2019-12-04 18:45:35

Recently Reported IPs

127.101.52.22 56.104.246.230 181.120.169.239 25.153.233.47
169.79.111.133 9.39.170.138 106.213.207.149 218.248.41.233
122.108.17.27 216.58.215.74 40.251.50.80 13.204.120.100
138.84.251.167 224.231.140.38 118.53.213.188 204.20.50.178
182.219.208.132 185.249.246.157 68.160.38.8 255.152.234.118