Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Slovakia (SLOVAK Republic)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
213.215.82.36 attackbots
Lines containing failures of 213.215.82.36
Oct 16 20:41:17 dns01 sshd[22450]: Invalid user builduser from 213.215.82.36 port 29521
Oct 16 20:41:17 dns01 sshd[22450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.215.82.36
Oct 16 20:41:19 dns01 sshd[22450]: Failed password for invalid user builduser from 213.215.82.36 port 29521 ssh2
Oct 16 20:41:19 dns01 sshd[22450]: Received disconnect from 213.215.82.36 port 29521:11: Bye Bye [preauth]
Oct 16 20:41:19 dns01 sshd[22450]: Disconnected from invalid user builduser 213.215.82.36 port 29521 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=213.215.82.36
2019-10-21 04:58:33
213.215.82.36 attack
Oct 20 02:01:33 plusreed sshd[5805]: Invalid user abas from 213.215.82.36
...
2019-10-20 14:21:33
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.215.82.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17443
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.215.82.41.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 03:58:51 CST 2022
;; MSG SIZE  rcvd: 106
Host info
41.82.215.213.in-addr.arpa domain name pointer ac41.cns.pn.cust.gts.sk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.82.215.213.in-addr.arpa	name = ac41.cns.pn.cust.gts.sk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
134.175.111.215 attackbotsspam
SSH Brute-Force attacks
2020-03-28 07:49:03
134.209.90.139 attack
Invalid user smeker from 134.209.90.139 port 42070
2020-03-28 07:59:52
43.225.151.252 attackspam
SSH Login Bruteforce
2020-03-28 07:47:43
40.89.178.114 attack
Invalid user oracle from 40.89.178.114 port 40272
2020-03-28 07:58:09
94.243.137.238 attackbotsspam
Mar 28 00:23:59 sso sshd[30101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.243.137.238
Mar 28 00:24:01 sso sshd[30101]: Failed password for invalid user sda from 94.243.137.238 port 34745 ssh2
...
2020-03-28 07:40:56
62.234.83.50 attackbots
Invalid user tz from 62.234.83.50 port 36971
2020-03-28 08:12:41
188.168.27.71 attack
proto=tcp  .  spt=33663  .  dpt=25  .     Found on   Blocklist de       (709)
2020-03-28 07:35:36
46.151.210.60 attackbots
leo_www
2020-03-28 07:38:06
89.109.23.190 attackbotsspam
Invalid user lichengzhang from 89.109.23.190 port 43232
2020-03-28 08:02:11
81.2.47.181 attack
proto=tcp  .  spt=59256  .  dpt=25  .     Found on   Dark List de      (706)
2020-03-28 07:47:07
222.73.215.81 attackspambots
Mar 27 22:46:38 ns381471 sshd[23266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.73.215.81
Mar 27 22:46:40 ns381471 sshd[23266]: Failed password for invalid user nak from 222.73.215.81 port 48200 ssh2
2020-03-28 07:39:41
81.183.212.198 attackbotsspam
Mar 28 00:50:37 mout sshd[31612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.183.212.198
Mar 28 00:50:37 mout sshd[31612]: Invalid user shc from 81.183.212.198 port 17057
Mar 28 00:50:40 mout sshd[31612]: Failed password for invalid user shc from 81.183.212.198 port 17057 ssh2
2020-03-28 08:04:28
51.68.121.235 attack
Invalid user trac from 51.68.121.235 port 43832
2020-03-28 07:37:20
107.170.227.141 attack
Mar 28 00:11:45 host01 sshd[15982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.227.141 
Mar 28 00:11:48 host01 sshd[15982]: Failed password for invalid user icx from 107.170.227.141 port 41446 ssh2
Mar 28 00:15:55 host01 sshd[16780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.227.141 
...
2020-03-28 08:00:20
213.154.11.207 attack
CMS (WordPress or Joomla) login attempt.
2020-03-28 08:19:18

Recently Reported IPs

212.24.148.234 213.135.5.141 137.184.60.41 34.121.195.155
139.224.101.170 23.254.54.63 185.237.165.173 200.9.125.1
120.86.253.122 89.185.28.153 190.123.40.143 36.110.85.91
194.158.72.144 20.127.201.218 191.242.127.91 14.0.19.195
106.3.195.189 45.70.102.212 197.156.134.170 171.239.25.187