Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
213.142.96.118 attackspambots
C1,WP GET /wp-login.php
GET /wp-login.php
2019-12-29 05:00:01
213.142.96.167 attackspambots
Unauthorized access to web resources
2019-08-04 06:52:30
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.142.96.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33473
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.142.96.55.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100602 1800 900 604800 86400

;; Query time: 190 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 06:32:46 CST 2022
;; MSG SIZE  rcvd: 106
Host info
55.96.142.213.in-addr.arpa domain name pointer 213142096055.public.telering.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.96.142.213.in-addr.arpa	name = 213142096055.public.telering.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.86.203.45 attack
xmlrpc attack
2020-05-26 01:14:34
181.196.150.66 attackbotsspam
Spam
2020-05-26 01:37:41
175.142.65.15 attackspambots
175.142.65.15 - - [25/May/2020:14:00:02 +0200] "GET /wp-login.php HTTP/1.1" 302 576
...
2020-05-26 01:34:39
122.225.74.98 attack
firewall-block, port(s): 445/tcp
2020-05-26 01:19:16
222.186.173.215 attack
$f2bV_matches
2020-05-26 01:15:29
14.176.179.28 attackbotsspam
Unauthorized connection attempt from IP address 14.176.179.28 on Port 445(SMB)
2020-05-26 01:05:10
185.234.217.39 attackbotsspam
none
2020-05-26 01:21:06
177.135.103.94 attack
(imapd) Failed IMAP login from 177.135.103.94 (BR/Brazil/177.135.103.94.dynamic.adsl.gvt.net.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 25 17:51:23 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=177.135.103.94, lip=5.63.12.44, session=
2020-05-26 01:24:40
85.214.198.36 attack
May 25 15:25:06 XXX sshd[10327]: Invalid user admin from 85.214.198.36 port 45576
2020-05-26 01:42:43
180.101.248.148 attackbots
May 25 11:55:07 XXX sshd[20172]: Invalid user plaza from 180.101.248.148 port 54428
2020-05-26 01:26:58
222.122.202.149 attackspam
Invalid user db2inst2 from 222.122.202.149 port 61782
2020-05-26 01:23:33
222.186.42.155 attackspambots
May 25 19:38:03 home sshd[21647]: Failed password for root from 222.186.42.155 port 20416 ssh2
May 25 19:38:37 home sshd[21698]: Failed password for root from 222.186.42.155 port 35341 ssh2
May 25 19:38:39 home sshd[21698]: Failed password for root from 222.186.42.155 port 35341 ssh2
May 25 19:38:42 home sshd[21698]: Failed password for root from 222.186.42.155 port 35341 ssh2
...
2020-05-26 01:44:27
106.53.28.5 attackbotsspam
May 25 17:09:24 h2646465 sshd[21786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.28.5  user=root
May 25 17:09:26 h2646465 sshd[21786]: Failed password for root from 106.53.28.5 port 36878 ssh2
May 25 17:22:50 h2646465 sshd[23661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.28.5  user=games
May 25 17:22:52 h2646465 sshd[23661]: Failed password for games from 106.53.28.5 port 58792 ssh2
May 25 17:30:36 h2646465 sshd[24897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.28.5  user=root
May 25 17:30:38 h2646465 sshd[24897]: Failed password for root from 106.53.28.5 port 34792 ssh2
May 25 17:34:20 h2646465 sshd[25047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.28.5  user=root
May 25 17:34:22 h2646465 sshd[25047]: Failed password for root from 106.53.28.5 port 51012 ssh2
May 25 17:38:09 h2646465 sshd[25634]: Inva
2020-05-26 01:21:32
62.234.178.25 attack
...
2020-05-26 01:26:02
82.112.45.48 attackspam
Unauthorized connection attempt from IP address 82.112.45.48 on Port 445(SMB)
2020-05-26 01:10:17

Recently Reported IPs

211.172.132.44 123.173.72.107 107.172.185.37 45.119.15.146
81.181.106.161 81.198.108.235 84.2.18.46 164.92.255.61
159.203.161.231 128.90.131.120 64.191.177.59 116.31.232.7
114.230.3.71 203.243.2.201 223.9.122.215 5.181.42.17
77.12.134.58 123.135.144.152 213.166.76.188 139.59.23.61