Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pettenhofen

Region: Bayern

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.165.109.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41623
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.165.109.116.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070701 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 08 12:50:59 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 116.109.165.213.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 116.109.165.213.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
132.147.68.40 attack
20 attempts against mh-misbehave-ban on rock
2020-01-26 07:22:04
117.67.219.215 attackbotsspam
Port scan on 1 port(s): 21
2020-01-26 07:09:17
139.59.0.243 attack
Jan 25 23:23:57 hcbbdb sshd\[14974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.0.243  user=root
Jan 25 23:23:58 hcbbdb sshd\[14974\]: Failed password for root from 139.59.0.243 port 56562 ssh2
Jan 25 23:27:11 hcbbdb sshd\[15406\]: Invalid user roger from 139.59.0.243
Jan 25 23:27:11 hcbbdb sshd\[15406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.0.243
Jan 25 23:27:12 hcbbdb sshd\[15406\]: Failed password for invalid user roger from 139.59.0.243 port 56384 ssh2
2020-01-26 07:30:17
222.186.180.8 attackspam
$f2bV_matches_ltvn
2020-01-26 07:12:14
191.176.234.152 attack
Invalid user dev from 191.176.234.152 port 24654
2020-01-26 07:28:16
190.237.52.233 attackspambots
Invalid user 1234 from 190.237.52.233 port 51052
2020-01-26 07:38:11
181.111.226.194 attackbotsspam
1579986637 - 01/25/2020 22:10:37 Host: 181.111.226.194/181.111.226.194 Port: 445 TCP Blocked
2020-01-26 07:40:46
45.55.84.16 attackspambots
Invalid user alarm from 45.55.84.16 port 58891
2020-01-26 07:23:42
1.196.223.50 attack
(sshd) Failed SSH login from 1.196.223.50 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan 26 00:26:34 ubnt-55d23 sshd[11128]: Invalid user papa from 1.196.223.50 port 61229
Jan 26 00:26:36 ubnt-55d23 sshd[11128]: Failed password for invalid user papa from 1.196.223.50 port 61229 ssh2
2020-01-26 07:39:23
121.11.113.225 attackspambots
Jan 25 22:08:19 Ubuntu-1404-trusty-64-minimal sshd\[7859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.11.113.225  user=root
Jan 25 22:08:22 Ubuntu-1404-trusty-64-minimal sshd\[7859\]: Failed password for root from 121.11.113.225 port 41632 ssh2
Jan 25 22:14:50 Ubuntu-1404-trusty-64-minimal sshd\[11105\]: Invalid user egor from 121.11.113.225
Jan 25 22:14:50 Ubuntu-1404-trusty-64-minimal sshd\[11105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.11.113.225
Jan 25 22:14:52 Ubuntu-1404-trusty-64-minimal sshd\[11105\]: Failed password for invalid user egor from 121.11.113.225 port 50304 ssh2
2020-01-26 07:20:00
14.231.131.95 attackspambots
TCP src-port=39777   dst-port=25   Listed on   dnsbl-sorbs abuseat-org barracuda         (588)
2020-01-26 07:07:52
222.186.173.183 attack
Jan 26 00:00:32 ns381471 sshd[21790]: Failed password for root from 222.186.173.183 port 33090 ssh2
Jan 26 00:00:46 ns381471 sshd[21790]: error: maximum authentication attempts exceeded for root from 222.186.173.183 port 33090 ssh2 [preauth]
2020-01-26 07:06:12
103.81.156.8 attack
Jan 25 23:28:20 game-panel sshd[24024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.81.156.8
Jan 25 23:28:23 game-panel sshd[24024]: Failed password for invalid user usuario from 103.81.156.8 port 48634 ssh2
Jan 25 23:31:31 game-panel sshd[24131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.81.156.8
2020-01-26 07:33:20
64.225.72.103 attack
Unauthorized connection attempt detected from IP address 64.225.72.103 to port 443 [J]
2020-01-26 07:14:21
138.68.171.25 attackspam
Jan 26 00:21:08 vmd17057 sshd\[26122\]: Invalid user user from 138.68.171.25 port 39406
Jan 26 00:21:08 vmd17057 sshd\[26122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.171.25
Jan 26 00:21:09 vmd17057 sshd\[26122\]: Failed password for invalid user user from 138.68.171.25 port 39406 ssh2
...
2020-01-26 07:29:07

Recently Reported IPs

106.107.178.50 188.11.255.249 182.52.70.245 116.72.225.72
131.100.76.57 95.134.189.66 195.242.232.14 113.178.94.51
203.113.8.86 184.90.101.92 143.208.184.211 114.38.19.156
88.10.6.64 159.137.211.117 191.53.116.56 36.6.152.219
103.30.82.232 14.215.48.20 13.58.247.184 198.84.144.220