Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jönköping

Region: Jönköping

Country: Sweden

Internet Service Provider: Telenor

Hostname: unknown

Organization: Telenor Norge AS

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.238.245.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55005
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.238.245.165.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 16:51:05 CST 2019
;; MSG SIZE  rcvd: 119

Host info
165.245.238.213.in-addr.arpa domain name pointer 213-238-245-165.customers.ownit.se.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
165.245.238.213.in-addr.arpa	name = 213-238-245-165.customers.ownit.se.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
45.227.254.30 attack
 TCP (SYN) 45.227.254.30:56549 -> port 12345, len 44
2020-07-06 23:36:01
206.189.92.162 attack
Fail2Ban Ban Triggered
2020-07-07 00:02:46
45.148.121.43 attack
probes 3 times on the port 11211
2020-07-06 23:36:45
45.145.66.112 attackbotsspam
scans 2 times in preceeding hours on the ports (in chronological order) 8089 6001
2020-07-06 23:37:44
51.91.247.125 attack
scans once in preceeding hours on the ports (in chronological order) 9042 resulting in total of 1 scans from 51.91.247.0/24 block.
2020-07-06 23:34:08
195.54.160.135 attackbots
Web application attack detected by fail2ban
2020-07-07 00:03:52
77.247.108.119 attack
 TCP (SYN) 77.247.108.119:40184 -> port 8501, len 44
2020-07-06 23:29:53
5.188.210.190 attack
07/06/2020-11:01:16.665848 5.188.210.190 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-06 23:42:28
1.192.94.61 attack
Jul  6 16:07:09 meumeu sshd[638064]: Invalid user printer from 1.192.94.61 port 57926
Jul  6 16:07:09 meumeu sshd[638064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.192.94.61 
Jul  6 16:07:09 meumeu sshd[638064]: Invalid user printer from 1.192.94.61 port 57926
Jul  6 16:07:11 meumeu sshd[638064]: Failed password for invalid user printer from 1.192.94.61 port 57926 ssh2
Jul  6 16:13:29 meumeu sshd[638382]: Invalid user contest from 1.192.94.61 port 54666
Jul  6 16:13:29 meumeu sshd[638382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.192.94.61 
Jul  6 16:13:29 meumeu sshd[638382]: Invalid user contest from 1.192.94.61 port 54666
Jul  6 16:13:31 meumeu sshd[638382]: Failed password for invalid user contest from 1.192.94.61 port 54666 ssh2
Jul  6 16:16:47 meumeu sshd[638530]: Invalid user ines from 1.192.94.61 port 53036
...
2020-07-06 23:43:28
172.104.112.228 attackbots
Jul  6 15:06:14 debian-2gb-nbg1-2 kernel: \[16299382.552893\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=172.104.112.228 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=35194 PROTO=TCP SPT=44423 DPT=815 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-06 23:53:54
185.39.10.47 attack
Jul  6 17:40:56 debian-2gb-nbg1-2 kernel: \[16308664.508219\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.39.10.47 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=19473 PROTO=TCP SPT=44666 DPT=6500 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-06 23:50:10
185.39.10.45 attackbotsspam
firewall-block, port(s): 15715/tcp, 15724/tcp, 15775/tcp, 15781/tcp, 15794/tcp
2020-07-06 23:50:26
185.39.11.55 attackbotsspam
 TCP (SYN) 185.39.11.55:44833 -> port 3486, len 44
2020-07-06 23:48:09
185.39.11.105 attackspam
Unauthorized connection attempt detected from IP address 185.39.11.105 to port 80
2020-07-06 23:47:07
93.174.93.200 attackspambots
07/06/2020-09:45:15.977394 93.174.93.200 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2020-07-07 00:00:01

Recently Reported IPs

112.152.8.182 176.109.230.24 54.95.146.159 82.146.58.240
78.209.33.254 118.138.255.188 119.148.31.241 75.35.90.32
213.127.209.194 50.86.3.246 88.64.100.4 18.179.87.6
76.23.35.118 187.199.168.61 196.198.137.216 104.236.110.8
175.217.89.89 107.92.209.227 4.119.83.192 157.230.157.99