Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.199.53.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43803
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.199.53.117.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 16:37:11 CST 2025
;; MSG SIZE  rcvd: 107
Host info
117.53.199.213.in-addr.arpa domain name pointer vmi2119552.contaboserver.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
117.53.199.213.in-addr.arpa	name = vmi2119552.contaboserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
81.68.129.2 attack
detected by Fail2Ban
2020-10-08 01:31:42
54.37.68.191 attackbotsspam
Oct  7 10:33:22 pixelmemory sshd[1473924]: Failed password for root from 54.37.68.191 port 54664 ssh2
Oct  7 10:36:44 pixelmemory sshd[1490227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.68.191  user=root
Oct  7 10:36:46 pixelmemory sshd[1490227]: Failed password for root from 54.37.68.191 port 60690 ssh2
Oct  7 10:40:07 pixelmemory sshd[1495537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.68.191  user=root
Oct  7 10:40:10 pixelmemory sshd[1495537]: Failed password for root from 54.37.68.191 port 38484 ssh2
...
2020-10-08 01:49:54
14.161.50.104 attack
2020-10-07T06:48:13.047894dreamphreak.com sshd[554015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.50.104  user=root
2020-10-07T06:48:15.162378dreamphreak.com sshd[554015]: Failed password for root from 14.161.50.104 port 58765 ssh2
...
2020-10-08 01:29:38
46.161.27.174 attackspambots
Oct  7 19:45:37 * sshd[1772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.161.27.174
Oct  7 19:45:39 * sshd[1772]: Failed password for invalid user debian from 46.161.27.174 port 58587 ssh2
2020-10-08 01:45:54
119.45.39.188 attackbotsspam
$f2bV_matches
2020-10-08 01:15:16
119.29.40.36 attack
2020-10-06 UTC: (33x) - root(33x)
2020-10-08 01:26:53
122.51.199.173 attackspambots
prod11
...
2020-10-08 01:44:53
20.185.66.89 attackspambots
 TCP (SYN) 20.185.66.89:48573 -> port 443, len 44
2020-10-08 01:44:01
125.124.72.157 attack
(sshd) Failed SSH login from 125.124.72.157 (CN/China/-): 5 in the last 3600 secs
2020-10-08 01:48:30
67.209.185.218 attack
Oct  7 18:11:02 server sshd[29365]: Failed password for root from 67.209.185.218 port 53680 ssh2
Oct  7 18:24:55 server sshd[4769]: Failed password for root from 67.209.185.218 port 51030 ssh2
Oct  7 18:29:23 server sshd[7169]: Failed password for root from 67.209.185.218 port 56536 ssh2
2020-10-08 01:29:02
104.138.237.72 spambotsattackproxynormal
104.138.237.83
2020-10-08 01:45:59
157.245.198.64 attackspambots
Oct  7 19:03:35 lnxweb61 sshd[2412]: Failed password for root from 157.245.198.64 port 51136 ssh2
Oct  7 19:06:28 lnxweb61 sshd[4424]: Failed password for root from 157.245.198.64 port 60284 ssh2
2020-10-08 01:32:22
58.87.127.93 attackbotsspam
Oct  6 21:40:11 ip-172-31-42-142 sshd\[7290\]: Failed password for root from 58.87.127.93 port 54878 ssh2\
Oct  6 21:42:32 ip-172-31-42-142 sshd\[7312\]: Failed password for root from 58.87.127.93 port 54944 ssh2\
Oct  6 21:45:02 ip-172-31-42-142 sshd\[7353\]: Failed password for root from 58.87.127.93 port 55024 ssh2\
Oct  6 21:47:17 ip-172-31-42-142 sshd\[7380\]: Failed password for root from 58.87.127.93 port 55080 ssh2\
Oct  6 21:49:40 ip-172-31-42-142 sshd\[7406\]: Failed password for root from 58.87.127.93 port 55148 ssh2\
2020-10-08 01:53:03
142.11.227.94 attackspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-08 01:39:17
101.89.219.59 attack
Found on   Dark List de    / proto=6  .  srcport=50738  .  dstport=2369  .     (166)
2020-10-08 01:33:02

Recently Reported IPs

197.195.118.235 66.225.90.71 145.77.129.126 150.135.131.111
43.24.244.182 67.173.151.67 201.152.152.79 230.73.71.154
140.226.55.238 235.96.197.234 67.35.11.122 166.49.33.51
236.29.16.52 87.164.20.222 198.57.47.223 15.9.113.31
195.204.217.157 190.209.167.214 48.8.247.142 192.40.51.21