Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Prazins

Region: Braga

Country: Portugal

Internet Service Provider: NOS

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.205.95.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62634
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.205.95.135.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 17:50:20 CST 2025
;; MSG SIZE  rcvd: 107
Host info
135.95.205.213.in-addr.arpa domain name pointer 213-205-95-135.net.novis.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
135.95.205.213.in-addr.arpa	name = 213-205-95-135.net.novis.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
191.5.55.7 attackspam
Oct 13 13:58:38 eventyay sshd[4073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.5.55.7
Oct 13 13:58:40 eventyay sshd[4073]: Failed password for invalid user okapon from 191.5.55.7 port 41233 ssh2
Oct 13 14:03:14 eventyay sshd[4281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.5.55.7
...
2020-10-14 00:49:22
92.63.197.53 attack
firewall-block, port(s): 11020/tcp, 11021/tcp, 11301/tcp, 11302/tcp, 11303/tcp, 11345/tcp
2020-10-14 00:22:42
209.141.33.122 attackbotsspam
Invalid user admin from 209.141.33.122 port 43816
2020-10-14 00:10:48
125.91.126.92 attack
Oct 13 16:17:10 hell sshd[17632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.91.126.92
Oct 13 16:17:13 hell sshd[17632]: Failed password for invalid user sms from 125.91.126.92 port 46098 ssh2
...
2020-10-14 00:44:02
49.232.86.244 attack
various type of attack
2020-10-14 00:53:11
175.24.67.217 attack
Invalid user deployer from 175.24.67.217 port 33436
2020-10-14 00:47:43
122.194.229.54 attackspam
2020-10-13T18:02:16.335720news0 sshd[28778]: User root from 122.194.229.54 not allowed because not listed in AllowUsers
2020-10-13T18:02:16.653543news0 sshd[28778]: Failed none for invalid user root from 122.194.229.54 port 5450 ssh2
2020-10-13T18:02:19.007956news0 sshd[28778]: Failed password for invalid user root from 122.194.229.54 port 5450 ssh2
...
2020-10-14 00:12:05
58.87.125.133 attackbotsspam
various type of attack
2020-10-14 00:28:57
5.101.151.41 attackbotsspam
Invalid user nagano from 5.101.151.41 port 63756
2020-10-14 00:33:47
164.163.253.86 attack
Port scan on 1 port(s): 445
2020-10-14 00:34:40
157.245.98.160 attackbotsspam
Oct 13 15:02:17 DAAP sshd[3064]: Invalid user pete from 157.245.98.160 port 57806
Oct 13 15:02:17 DAAP sshd[3064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.98.160
Oct 13 15:02:17 DAAP sshd[3064]: Invalid user pete from 157.245.98.160 port 57806
Oct 13 15:02:20 DAAP sshd[3064]: Failed password for invalid user pete from 157.245.98.160 port 57806 ssh2
Oct 13 15:06:19 DAAP sshd[3176]: Invalid user benedikt from 157.245.98.160 port 35168
...
2020-10-14 00:37:46
218.92.0.168 attack
$f2bV_matches
2020-10-14 00:25:01
14.232.160.213 attackspam
Invalid user sysman from 14.232.160.213 port 40086
2020-10-14 00:27:26
222.82.250.5 attack
various type of attack
2020-10-14 00:40:46
84.229.18.62 attackspam
Icarus honeypot on github
2020-10-14 00:26:33

Recently Reported IPs

161.31.217.232 198.185.250.36 61.204.139.0 18.194.250.23
127.147.155.104 198.146.216.56 131.87.229.8 6.9.79.16
20.225.107.51 94.103.41.215 56.211.219.48 199.51.138.127
25.2.97.224 60.50.121.83 64.14.177.198 16.91.184.127
87.248.235.55 207.167.93.165 60.204.173.92 42.8.238.39