Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.92.104.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44933
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.92.104.95.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011801 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 19 07:28:16 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 95.104.92.214.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 214.92.104.95.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
192.241.233.165 attackspambots
 TCP (SYN) 192.241.233.165:34411 -> port 80, len 40
2020-07-17 00:25:00
140.0.66.245 attack
2020-07-16 08:43:31.116203-0500  localhost smtpd[93618]: NOQUEUE: reject: RCPT from unknown[140.0.66.245]: 554 5.7.1 Service unavailable; Client host [140.0.66.245] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/140.0.66.245; from= to= proto=ESMTP helo=
2020-07-17 00:11:11
139.99.43.235 attack
Jul 16 15:48:18 ArkNodeAT sshd\[14924\]: Invalid user music from 139.99.43.235
Jul 16 15:48:18 ArkNodeAT sshd\[14924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.43.235
Jul 16 15:48:19 ArkNodeAT sshd\[14924\]: Failed password for invalid user music from 139.99.43.235 port 37208 ssh2
2020-07-16 23:45:05
20.43.56.138 attackspam
Multiple SSH login attempts.
2020-07-17 00:28:23
210.184.2.66 attackspambots
2020-07-16T09:51:15.306664linuxbox-skyline sshd[23224]: Invalid user lm from 210.184.2.66 port 48608
...
2020-07-16 23:57:11
185.220.101.166 attackbotsspam
20 attempts against mh_ha-misbehave-ban on oak
2020-07-17 00:30:24
62.210.89.3 attack
Automatic report - Banned IP Access
2020-07-17 00:09:11
168.63.110.46 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-07-16 23:49:48
184.169.100.99 attackspam
Brute forcing email accounts
2020-07-16 23:45:49
159.89.172.219 attack
WordPress logging hack
2020-07-16 23:55:52
104.41.59.240 attackbots
Jul 16 17:12:16 mout sshd[25762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.41.59.240  user=root
Jul 16 17:12:18 mout sshd[25762]: Failed password for root from 104.41.59.240 port 1216 ssh2
2020-07-16 23:51:14
148.223.120.122 attackspambots
Jul 16 21:08:23 dhoomketu sshd[1574674]: Invalid user ruzicka from 148.223.120.122 port 46271
Jul 16 21:08:23 dhoomketu sshd[1574674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.223.120.122 
Jul 16 21:08:23 dhoomketu sshd[1574674]: Invalid user ruzicka from 148.223.120.122 port 46271
Jul 16 21:08:24 dhoomketu sshd[1574674]: Failed password for invalid user ruzicka from 148.223.120.122 port 46271 ssh2
Jul 16 21:13:08 dhoomketu sshd[1574807]: Invalid user sysadm from 148.223.120.122 port 50903
...
2020-07-17 00:06:53
112.17.245.5 attackbotsspam
Brute-force attempt banned
2020-07-17 00:23:44
93.84.111.7 attack
...
2020-07-17 00:24:39
139.59.58.155 attack
" "
2020-07-16 23:53:38

Recently Reported IPs

76.158.52.253 76.158.52.113 76.158.52.229 21.254.192.10
17.201.249.187 253.52.158.76 38.20.65.87 253.52.158.130
121.68.92.192 59.72.235.250 209.141.55.187 37.199.18.194
209.141.55.49 209.141.55.119 209.141.55.242 149.6.181.201
123.37.237.124 104.107.45.146 128.199.175.149 131.214.21.149