Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: T-Mobile Austria GmbH

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbotsspam
Jul 17 19:23:41 dev0-dcde-rnet sshd[25829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.47.20.97
Jul 17 19:23:43 dev0-dcde-rnet sshd[25829]: Failed password for invalid user mpd from 213.47.20.97 port 44172 ssh2
Jul 17 19:30:07 dev0-dcde-rnet sshd[25892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.47.20.97
2020-07-18 01:48:12
attack
Jul 16 04:32:58 localhost sshd[65779]: Invalid user omn from 213.47.20.97 port 52004
Jul 16 04:32:58 localhost sshd[65779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213-47-20-97.cable.dynamic.surfer.at
Jul 16 04:32:58 localhost sshd[65779]: Invalid user omn from 213.47.20.97 port 52004
Jul 16 04:33:01 localhost sshd[65779]: Failed password for invalid user omn from 213.47.20.97 port 52004 ssh2
Jul 16 04:39:12 localhost sshd[66342]: Invalid user hrb from 213.47.20.97 port 33550
...
2020-07-16 12:57:07
attackspambots
Jul 13 22:38:40 mout sshd[28407]: Disconnected from invalid user service 213.47.20.97 port 43150 [preauth]
Jul 13 22:40:55 mout sshd[28771]: Invalid user alex from 213.47.20.97 port 39178
Jul 13 22:40:55 mout sshd[28771]: Invalid user alex from 213.47.20.97 port 39178
2020-07-14 06:07:45
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.47.20.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.47.20.97.			IN	A

;; AUTHORITY SECTION:
.			157	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071301 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jul 14 06:07:42 CST 2020
;; MSG SIZE  rcvd: 116
Host info
97.20.47.213.in-addr.arpa domain name pointer 213-47-20-97.cable.dynamic.surfer.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
97.20.47.213.in-addr.arpa	name = 213-47-20-97.cable.dynamic.surfer.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
152.136.151.152 attackspambots
Nov 13 01:14:17 srv206 sshd[17847]: Invalid user buky from 152.136.151.152
...
2019-11-13 08:54:40
119.42.175.200 attackbots
Nov 12 12:20:22 server sshd\[21850\]: Failed password for invalid user narendra from 119.42.175.200 port 38844 ssh2
Nov 12 19:38:45 server sshd\[7466\]: Invalid user www from 119.42.175.200
Nov 12 19:38:45 server sshd\[7466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.42.175.200 
Nov 12 19:38:47 server sshd\[7466\]: Failed password for invalid user www from 119.42.175.200 port 34859 ssh2
Nov 13 03:13:30 server sshd\[31887\]: Invalid user zabbix from 119.42.175.200
...
2019-11-13 08:46:21
222.186.175.220 attack
Nov 12 21:40:51 firewall sshd[31895]: Failed password for root from 222.186.175.220 port 52400 ssh2
Nov 12 21:41:05 firewall sshd[31895]: error: maximum authentication attempts exceeded for root from 222.186.175.220 port 52400 ssh2 [preauth]
Nov 12 21:41:05 firewall sshd[31895]: Disconnecting: Too many authentication failures [preauth]
...
2019-11-13 08:45:42
161.202.192.219 attackbots
Nov 13 00:28:53 minden010 sshd[31035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.202.192.219
Nov 13 00:28:54 minden010 sshd[31035]: Failed password for invalid user pufpaff from 161.202.192.219 port 43946 ssh2
Nov 13 00:34:43 minden010 sshd[592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.202.192.219
...
2019-11-13 08:38:50
1.55.87.1 attackbotsspam
Nov 12 23:33:59 localhost sshd\[5987\]: Invalid user tech from 1.55.87.1 port 56332
Nov 12 23:33:59 localhost sshd\[5987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.55.87.1
Nov 12 23:34:02 localhost sshd\[5987\]: Failed password for invalid user tech from 1.55.87.1 port 56332 ssh2
2019-11-13 08:32:07
95.111.59.210 attack
2019-11-12T23:44:13.028356abusebot-3.cloudsearch.cf sshd\[30436\]: Invalid user pi from 95.111.59.210 port 52718
2019-11-13 08:48:07
175.29.127.11 attackspam
Unauthorised access (Nov 13) SRC=175.29.127.11 LEN=40 TTL=44 ID=58294 TCP DPT=23 WINDOW=17835 SYN
2019-11-13 09:00:26
139.59.161.78 attackbots
Nov 13 00:09:04 localhost sshd\[28202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.161.78  user=root
Nov 13 00:09:06 localhost sshd\[28202\]: Failed password for root from 139.59.161.78 port 33619 ssh2
Nov 13 00:27:34 localhost sshd\[28578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.161.78  user=root
...
2019-11-13 08:32:50
103.80.210.80 attack
Port 22 Scan, PTR: None
2019-11-13 08:27:52
81.22.45.190 attackbotsspam
Nov 13 01:27:09 mc1 kernel: \[4891106.149352\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.190 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=29773 PROTO=TCP SPT=45479 DPT=61495 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 13 01:27:41 mc1 kernel: \[4891138.812429\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.190 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=16700 PROTO=TCP SPT=45479 DPT=61276 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 13 01:30:34 mc1 kernel: \[4891311.530271\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.190 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=2929 PROTO=TCP SPT=45479 DPT=60567 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-13 08:34:00
112.85.42.94 attackspam
Nov 13 02:20:59 pkdns2 sshd\[27183\]: Failed password for root from 112.85.42.94 port 21377 ssh2Nov 13 02:21:01 pkdns2 sshd\[27183\]: Failed password for root from 112.85.42.94 port 21377 ssh2Nov 13 02:21:03 pkdns2 sshd\[27183\]: Failed password for root from 112.85.42.94 port 21377 ssh2Nov 13 02:21:36 pkdns2 sshd\[27216\]: Failed password for root from 112.85.42.94 port 48434 ssh2Nov 13 02:21:39 pkdns2 sshd\[27216\]: Failed password for root from 112.85.42.94 port 48434 ssh2Nov 13 02:21:41 pkdns2 sshd\[27216\]: Failed password for root from 112.85.42.94 port 48434 ssh2
...
2019-11-13 08:38:17
123.108.35.186 attack
Nov 13 01:08:56 vps666546 sshd\[25286\]: Invalid user webadmin from 123.108.35.186 port 33090
Nov 13 01:08:56 vps666546 sshd\[25286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.35.186
Nov 13 01:08:58 vps666546 sshd\[25286\]: Failed password for invalid user webadmin from 123.108.35.186 port 33090 ssh2
Nov 13 01:12:41 vps666546 sshd\[25508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.35.186  user=root
Nov 13 01:12:43 vps666546 sshd\[25508\]: Failed password for root from 123.108.35.186 port 43128 ssh2
...
2019-11-13 08:30:05
77.243.191.20 attackspambots
2019-11-12T22:59:59Z - RDP login failed multiple times. (77.243.191.20)
2019-11-13 09:05:51
103.228.55.79 attackspambots
Nov 13 01:53:20 vps647732 sshd[22767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.55.79
Nov 13 01:53:22 vps647732 sshd[22767]: Failed password for invalid user lorenz from 103.228.55.79 port 56036 ssh2
...
2019-11-13 09:04:15
86.39.3.25 attackbots
$f2bV_matches
2019-11-13 08:51:45

Recently Reported IPs

234.242.125.129 198.245.50.34 51.129.199.203 51.132.13.12
105.213.175.229 27.72.40.190 44.118.54.76 10.139.5.154
176.193.147.242 140.41.160.79 60.152.119.99 30.44.224.69
99.88.23.31 165.67.202.28 185.189.121.8 194.180.15.158
181.15.129.115 247.25.51.110 184.62.83.4 172.105.106.64