Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.114.104.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29888
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.114.104.96.			IN	A

;; AUTHORITY SECTION:
.			594	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 16:44:05 CST 2022
;; MSG SIZE  rcvd: 107
Host info
96.104.114.213.in-addr.arpa domain name pointer ua-213-114-104-96.bbcust.telenor.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
96.104.114.213.in-addr.arpa	name = ua-213-114-104-96.bbcust.telenor.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
84.242.82.158 attackspambots
Invalid user joerg from 84.242.82.158 port 56720
2020-06-18 04:07:43
181.167.1.152 attackspambots
Invalid user maquina from 181.167.1.152 port 56800
2020-06-18 04:18:01
79.17.217.113 attack
Invalid user test from 79.17.217.113 port 50808
2020-06-18 04:08:19
103.40.248.84 attack
Lines containing failures of 103.40.248.84
Jun 16 21:36:48 kmh-wmh-001-nbg01 sshd[20802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.40.248.84  user=mysql
Jun 16 21:36:49 kmh-wmh-001-nbg01 sshd[20802]: Failed password for mysql from 103.40.248.84 port 40468 ssh2
Jun 16 21:36:50 kmh-wmh-001-nbg01 sshd[20802]: Received disconnect from 103.40.248.84 port 40468:11: Bye Bye [preauth]
Jun 16 21:36:50 kmh-wmh-001-nbg01 sshd[20802]: Disconnected from authenticating user mysql 103.40.248.84 port 40468 [preauth]
Jun 16 21:47:33 kmh-wmh-001-nbg01 sshd[22059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.40.248.84  user=r.r
Jun 16 21:47:35 kmh-wmh-001-nbg01 sshd[22059]: Failed password for r.r from 103.40.248.84 port 34764 ssh2
Jun 16 21:47:37 kmh-wmh-001-nbg01 sshd[22059]: Received disconnect from 103.40.248.84 port 34764:11: Bye Bye [preauth]
Jun 16 21:47:37 kmh-wmh-001-nbg01 sshd[22059........
------------------------------
2020-06-18 03:48:42
197.62.240.211 attack
Invalid user pwn from 197.62.240.211 port 33146
2020-06-18 03:55:21
93.148.0.91 attackspam
Invalid user nagios from 93.148.0.91 port 39560
2020-06-18 03:49:01
185.203.243.195 attackbots
Invalid user admin from 185.203.243.195 port 60786
2020-06-18 03:41:20
186.93.60.224 attack
Invalid user ftpuser from 186.93.60.224 port 57766
2020-06-18 04:17:46
58.210.154.140 attackbotsspam
Failed password for invalid user m1 from 58.210.154.140 port 48894 ssh2
2020-06-18 03:50:04
34.67.249.114 attack
2020-06-16 18:32:34 server sshd[38974]: Failed password for invalid user root from 34.67.249.114 port 50906 ssh2
2020-06-18 03:53:32
89.163.150.32 attack
Jun 17 18:20:12 pbkit sshd[192743]: Invalid user nfs from 89.163.150.32 port 35560
Jun 17 18:20:14 pbkit sshd[192743]: Failed password for invalid user nfs from 89.163.150.32 port 35560 ssh2
Jun 17 18:27:08 pbkit sshd[192911]: Invalid user smtp from 89.163.150.32 port 41634
...
2020-06-18 04:07:28
222.186.61.174 attackspambots
Invalid user lol from 222.186.61.174 port 50680
2020-06-18 04:12:07
1.214.215.236 attackspam
SSH Brute-Force reported by Fail2Ban
2020-06-18 03:37:24
202.192.34.106 attack
Jun 17 21:57:15 meumeu sshd[783525]: Invalid user valeria from 202.192.34.106 port 54492
Jun 17 21:57:15 meumeu sshd[783525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.192.34.106 
Jun 17 21:57:15 meumeu sshd[783525]: Invalid user valeria from 202.192.34.106 port 54492
Jun 17 21:57:17 meumeu sshd[783525]: Failed password for invalid user valeria from 202.192.34.106 port 54492 ssh2
Jun 17 21:59:30 meumeu sshd[783674]: Invalid user fuk from 202.192.34.106 port 50883
Jun 17 21:59:30 meumeu sshd[783674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.192.34.106 
Jun 17 21:59:30 meumeu sshd[783674]: Invalid user fuk from 202.192.34.106 port 50883
Jun 17 21:59:32 meumeu sshd[783674]: Failed password for invalid user fuk from 202.192.34.106 port 50883 ssh2
Jun 17 22:01:52 meumeu sshd[784114]: Invalid user user1 from 202.192.34.106 port 63637
...
2020-06-18 04:14:41
155.94.158.21 attackbots
2020-06-17T21:08:50.645833mail.broermann.family sshd[8085]: Failed password for invalid user sekine from 155.94.158.21 port 34428 ssh2
2020-06-17T21:10:38.076465mail.broermann.family sshd[8276]: Invalid user hl from 155.94.158.21 port 41042
2020-06-17T21:10:38.081466mail.broermann.family sshd[8276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.94.158.21
2020-06-17T21:10:38.076465mail.broermann.family sshd[8276]: Invalid user hl from 155.94.158.21 port 41042
2020-06-17T21:10:40.257254mail.broermann.family sshd[8276]: Failed password for invalid user hl from 155.94.158.21 port 41042 ssh2
...
2020-06-18 03:59:18

Recently Reported IPs

213.110.9.225 213.112.181.242 213.114.236.151 213.127.45.184
189.58.1.97 213.121.7.232 213.128.18.12 213.134.181.42
213.133.108.178 213.134.191.103 213.135.176.40 213.127.98.83
213.135.156.69 213.139.195.11 213.14.113.197 213.14.165.30
213.14.233.108 213.137.109.14 213.14.46.90 213.14.233.78