Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ronneby

Region: Blekinge County

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.164.207.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38849
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.164.207.111.		IN	A

;; AUTHORITY SECTION:
.			550	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100902 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 10 09:36:17 CST 2020
;; MSG SIZE  rcvd: 119
Host info
111.207.164.213.in-addr.arpa domain name pointer s207h111o2tcm16.dyn.tyfon.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
111.207.164.213.in-addr.arpa	name = s207h111o2tcm16.dyn.tyfon.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
151.80.60.151 attackspambots
$f2bV_matches
2020-01-11 21:29:51
113.190.146.70 attackbotsspam
Spam Timestamp : 11-Jan-20 12:12   BlockList Provider  SORBS open web   (293)
2020-01-11 22:00:18
178.124.204.141 attack
(imapd) Failed IMAP login from 178.124.204.141 (BY/Belarus/178.124.204.141.pppoe.vitebsk.by): 1 in the last 3600 secs
2020-01-11 21:42:29
150.95.217.109 attack
$f2bV_matches
2020-01-11 21:36:21
150.129.121.27 attackbotsspam
$f2bV_matches
2020-01-11 21:45:47
149.56.141.193 attackspambots
Unauthorized connection attempt detected from IP address 149.56.141.193 to port 2220 [J]
2020-01-11 21:52:55
152.136.101.83 attackbots
$f2bV_matches
2020-01-11 21:26:31
150.223.5.3 attackspam
$f2bV_matches
2020-01-11 21:39:27
178.128.122.89 attackbots
178.128.122.89 - - \[11/Jan/2020:14:11:20 +0100\] "POST /wp-login.php HTTP/1.0" 200 3080 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
178.128.122.89 - - \[11/Jan/2020:14:11:28 +0100\] "POST /wp-login.php HTTP/1.0" 200 3039 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
178.128.122.89 - - \[11/Jan/2020:14:11:41 +0100\] "POST /wp-login.php HTTP/1.0" 200 3048 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-11 21:25:47
149.56.45.87 attackbots
$f2bV_matches
2020-01-11 21:51:30
150.136.144.106 attackbots
$f2bV_matches
2020-01-11 21:44:20
112.85.42.238 attackbotsspam
SSH Brute-Force attacks
2020-01-11 21:26:59
150.95.142.47 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-01-11 21:38:44
150.136.133.20 attackbots
$f2bV_matches
2020-01-11 21:44:34
150.95.212.72 attackbots
$f2bV_matches
2020-01-11 21:37:10

Recently Reported IPs

74.108.214.218 97.150.171.50 113.91.99.240 150.198.48.68
80.203.200.216 174.57.93.105 183.232.51.59 31.6.30.251
59.189.158.102 13.95.124.184 32.152.20.166 184.218.13.26
193.204.75.118 119.181.142.24 196.134.132.3 60.226.135.144
58.101.255.64 176.190.59.67 80.193.199.170 93.131.144.162