Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dortmund

Region: Nordrhein-Westfalen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.185.78.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27902
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.185.78.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 08:13:10 CST 2025
;; MSG SIZE  rcvd: 107
Host info
114.78.185.213.in-addr.arpa domain name pointer ip-114-078-185-213.cpe.my-wire.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.78.185.213.in-addr.arpa	name = ip-114-078-185-213.cpe.my-wire.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.166.237.117 attackspambots
2019-11-07 05:18:26,218 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 122.166.237.117
2019-11-07 05:53:07,904 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 122.166.237.117
2019-11-07 06:23:51,033 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 122.166.237.117
2019-11-07 06:54:23,842 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 122.166.237.117
2019-11-07 07:24:58,267 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 122.166.237.117
...
2019-11-07 18:30:48
164.132.107.245 attackbotsspam
$f2bV_matches
2019-11-07 18:30:34
168.232.197.11 attack
Nov  6 20:55:06 sachi sshd\[27589\]: Invalid user undress from 168.232.197.11
Nov  6 20:55:06 sachi sshd\[27589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168-232-197-11.static.konectivatelecomunicacoes.com.br
Nov  6 20:55:08 sachi sshd\[27589\]: Failed password for invalid user undress from 168.232.197.11 port 51572 ssh2
Nov  6 20:59:34 sachi sshd\[27930\]: Invalid user pearl from 168.232.197.11
Nov  6 20:59:34 sachi sshd\[27930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168-232-197-11.static.konectivatelecomunicacoes.com.br
2019-11-07 19:01:10
185.220.102.7 attackbots
11/07/2019-10:54:23.647265 185.220.102.7 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 34
2019-11-07 18:52:05
216.144.251.86 attack
Nov  7 07:24:36 MK-Soft-VM6 sshd[16850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.144.251.86 
Nov  7 07:24:39 MK-Soft-VM6 sshd[16850]: Failed password for invalid user sr from 216.144.251.86 port 43498 ssh2
...
2019-11-07 18:46:46
119.29.170.120 attackbotsspam
Nov  7 10:54:41 MK-Soft-VM4 sshd[7058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.170.120 
Nov  7 10:54:42 MK-Soft-VM4 sshd[7058]: Failed password for invalid user tyidc@))( from 119.29.170.120 port 45230 ssh2
...
2019-11-07 18:48:31
51.77.144.50 attack
ssh failed login
2019-11-07 18:54:26
194.60.237.67 attackspam
Chat Spam
2019-11-07 18:45:40
84.209.67.208 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/84.209.67.208/ 
 
 NO - 1H : (7)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : NO 
 NAME ASN : ASN41164 
 
 IP : 84.209.67.208 
 
 CIDR : 84.209.0.0/17 
 
 PREFIX COUNT : 53 
 
 UNIQUE IP COUNT : 607744 
 
 
 ATTACKS DETECTED ASN41164 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 3 
 24H - 4 
 
 DateTime : 2019-11-07 07:24:03 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-07 19:06:29
213.198.11.107 attackspam
Nov  6 02:26:26 hurricane sshd[29215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.198.11.107  user=r.r
Nov  6 02:26:27 hurricane sshd[29215]: Failed password for r.r from 213.198.11.107 port 53512 ssh2
Nov  6 02:26:27 hurricane sshd[29215]: Received disconnect from 213.198.11.107 port 53512:11: Bye Bye [preauth]
Nov  6 02:26:27 hurricane sshd[29215]: Disconnected from 213.198.11.107 port 53512 [preauth]
Nov  6 02:48:06 hurricane sshd[29301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.198.11.107  user=r.r
Nov  6 02:48:08 hurricane sshd[29301]: Failed password for r.r from 213.198.11.107 port 47016 ssh2
Nov  6 02:48:08 hurricane sshd[29301]: Received disconnect from 213.198.11.107 port 47016:11: Bye Bye [preauth]
Nov  6 02:48:08 hurricane sshd[29301]: Disconnected from 213.198.11.107 port 47016 [preauth]
Nov  6 02:51:41 hurricane sshd[29312]: pam_unix(sshd:auth): authenticati........
-------------------------------
2019-11-07 18:51:49
217.29.18.206 attack
proto=tcp  .  spt=41677  .  dpt=25  .     (Listed on    unsubscore also rbldns-ru and manitu-net)     (368)
2019-11-07 18:49:26
118.24.32.48 attackspam
Nov  7 13:24:15 itv-usvr-01 sshd[28496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.32.48  user=root
Nov  7 13:24:17 itv-usvr-01 sshd[28496]: Failed password for root from 118.24.32.48 port 34146 ssh2
Nov  7 13:24:21 itv-usvr-01 sshd[28498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.32.48  user=root
Nov  7 13:24:23 itv-usvr-01 sshd[28498]: Failed password for root from 118.24.32.48 port 34408 ssh2
Nov  7 13:24:37 itv-usvr-01 sshd[28500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.32.48  user=root
Nov  7 13:24:39 itv-usvr-01 sshd[28500]: Failed password for root from 118.24.32.48 port 34694 ssh2
2019-11-07 18:47:04
45.55.231.94 attackbotsspam
Automatic report - Banned IP Access
2019-11-07 18:41:02
207.6.1.11 attack
Nov  7 13:06:37 areeb-Workstation sshd[12170]: Failed password for root from 207.6.1.11 port 53482 ssh2
Nov  7 13:10:49 areeb-Workstation sshd[13709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.6.1.11
...
2019-11-07 18:37:28
119.29.53.107 attackbots
Nov  7 11:26:55 sauna sshd[41003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.53.107
Nov  7 11:26:57 sauna sshd[41003]: Failed password for invalid user QWE1231zxc from 119.29.53.107 port 45370 ssh2
...
2019-11-07 18:54:09

Recently Reported IPs

80.186.57.9 185.248.211.27 49.113.170.13 9.25.225.26
89.145.170.60 220.78.44.215 215.38.156.179 26.17.109.126
157.191.235.193 119.241.87.190 196.254.106.170 107.116.180.142
230.105.198.104 81.145.219.228 195.54.166.2 96.114.251.241
156.208.147.211 69.240.170.111 231.113.9.224 37.218.26.200