Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chotěboř

Region: Vysocina Region (kraj Vysocina)

Country: Czechia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.19.16.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48618
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.19.16.2.			IN	A

;; AUTHORITY SECTION:
.			379	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052800 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 28 14:16:45 CST 2023
;; MSG SIZE  rcvd: 104
Host info
2.16.19.213.in-addr.arpa domain name pointer 2.16.19.213.client.nordic.tel.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.16.19.213.in-addr.arpa	name = 2.16.19.213.client.nordic.tel.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.58.4 attack
Invalid user uc from 106.12.58.4 port 51928
2019-10-22 17:50:56
159.203.201.144 attack
UTC: 2019-10-21 port: 22/tcp
2019-10-22 18:18:25
185.175.93.21 attackbotsspam
10/22/2019-05:26:56.741265 185.175.93.21 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-22 18:07:42
42.116.249.15 attackbots
UTC: 2019-10-21 port: 81/tcp
2019-10-22 18:13:01
34.219.178.212 attackspam
Lines containing failures of 34.219.178.212
Oct 22 09:30:01 shared04 sshd[21274]: Invalid user support from 34.219.178.212 port 50046
Oct 22 09:30:01 shared04 sshd[21274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.219.178.212
Oct 22 09:30:02 shared04 sshd[21274]: Failed password for invalid user support from 34.219.178.212 port 50046 ssh2
Oct 22 09:30:02 shared04 sshd[21274]: Received disconnect from 34.219.178.212 port 50046:11: Normal Shutdown, Thank you for playing [preauth]
Oct 22 09:30:02 shared04 sshd[21274]: Disconnected from invalid user support 34.219.178.212 port 50046 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=34.219.178.212
2019-10-22 18:05:17
212.83.191.184 attackbotsspam
10/22/2019-06:19:44.765789 212.83.191.184 Protocol: 17 ET SCAN Sipvicious Scan
2019-10-22 18:10:16
198.71.63.24 attackspambots
xmlrpc attack
2019-10-22 17:45:34
36.237.194.228 attackspambots
UTC: 2019-10-21 port: 23/tcp
2019-10-22 17:56:04
81.214.70.53 attack
UTC: 2019-10-21 port: 23/tcp
2019-10-22 18:19:45
45.95.168.150 attack
CloudCIX Reconnaissance Scan Detected, PTR: maxko-hosting.com.
2019-10-22 18:21:11
23.106.122.127 attack
" "
2019-10-22 18:16:38
159.203.201.42 attackbots
[portscan] tcp/22 [SSH]
*(RWIN=65535)(10221000)
2019-10-22 17:58:52
198.211.123.183 attackbotsspam
Oct 21 23:17:32 server sshd\[11580\]: Failed password for invalid user www from 198.211.123.183 port 48748 ssh2
Oct 22 06:42:56 server sshd\[10121\]: Invalid user ubuntu from 198.211.123.183
Oct 22 06:42:56 server sshd\[10121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.123.183 
Oct 22 06:42:58 server sshd\[10121\]: Failed password for invalid user ubuntu from 198.211.123.183 port 51238 ssh2
Oct 22 12:41:00 server sshd\[14289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.123.183  user=nagios
...
2019-10-22 17:51:59
80.211.9.207 attackbots
Oct 21 20:37:59 auw2 sshd\[1639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.9.207  user=root
Oct 21 20:38:01 auw2 sshd\[1639\]: Failed password for root from 80.211.9.207 port 50114 ssh2
Oct 21 20:42:19 auw2 sshd\[2162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.9.207  user=root
Oct 21 20:42:20 auw2 sshd\[2162\]: Failed password for root from 80.211.9.207 port 60876 ssh2
Oct 21 20:46:30 auw2 sshd\[2524\]: Invalid user opfor from 80.211.9.207
Oct 21 20:46:30 auw2 sshd\[2524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.9.207
2019-10-22 17:53:54
74.82.47.39 attackspam
firewall-block, port(s): 10001/udp
2019-10-22 18:18:49

Recently Reported IPs

119.192.130.213 71.110.42.25 245.8.236.171 121.152.97.223
95.111.11.111 67.241.228.210 33.36.28.13 27.133.157.206
9.49.55.74 10.73.83.57 38.130.252.76 10.190.151.78
93.182.74.30 248.2.167.188 76.48.170.83 221.72.95.98
55.239.244.78 10.67.63.10 5.147.243.23 100.71.194.215