Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Şimleu Silvaniei

Region: Salaj

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
46.214.192.199 attack
Automatic report - XMLRPC Attack
2020-08-24 22:48:20
46.214.120.147 attackspambots
Automatic report - Banned IP Access
2020-07-11 20:09:58
46.214.141.130 attackspambots
Attempt to log in with non-existing username: admin
2020-06-30 03:09:20
46.214.142.156 attackspambots
Attempted connection to port 8000.
2020-06-19 05:51:08
46.214.137.239 attackspam
Automatic report - XMLRPC Attack
2020-06-15 19:26:30
46.214.138.225 attackspambots
Attempt to log in with non-existing username: asteriorg
2020-06-08 16:53:24
46.214.123.55 attack
 TCP (SYN) 46.214.123.55:16855 -> port 23, len 44
2020-06-06 11:48:21
46.214.137.243 attack
Attempt to log in with non-existing username: asteriorg
2020-06-04 18:02:38
46.214.124.247 attackspam
Hits on port : 88
2020-05-09 06:36:44
46.214.123.55 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-06 05:05:01
46.214.120.147 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-06 01:33:38
46.214.18.137 attackspam
unauthorized connection attempt
2020-02-19 17:19:17
46.214.137.44 attackspambots
Unauthorized connection attempt from IP address 46.214.137.44 on Port 445(SMB)
2020-02-19 08:27:15
46.214.132.216 attackspambots
unauthorized connection attempt
2020-02-16 21:15:41
46.214.115.93 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-02-08 07:05:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.214.1.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47297
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;46.214.1.0.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025033101 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 01 04:12:34 CST 2025
;; MSG SIZE  rcvd: 103
Host info
0.1.214.46.in-addr.arpa domain name pointer 46-214-1-0.next-gen.ro.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
0.1.214.46.in-addr.arpa	name = 46-214-1-0.next-gen.ro.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.146.50.191 attackbotsspam
Brute Force
2020-08-21 01:59:38
139.198.191.86 attackspambots
Aug 20 06:43:53 dignus sshd[10035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.86  user=root
Aug 20 06:43:55 dignus sshd[10035]: Failed password for root from 139.198.191.86 port 36123 ssh2
Aug 20 06:49:21 dignus sshd[10713]: Invalid user colin from 139.198.191.86 port 35744
Aug 20 06:49:21 dignus sshd[10713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.86
Aug 20 06:49:23 dignus sshd[10713]: Failed password for invalid user colin from 139.198.191.86 port 35744 ssh2
...
2020-08-21 02:10:27
78.38.50.70 attackspambots
Automatic report - Port Scan Attack
2020-08-21 02:06:37
118.70.132.59 attack
Unauthorized connection attempt from IP address 118.70.132.59 on Port 445(SMB)
2020-08-21 01:47:29
122.51.195.237 attack
Triggered by Fail2Ban at Ares web server
2020-08-21 01:46:42
139.199.18.200 attackbots
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-08-21 01:44:20
121.18.85.114 attackbots
2020-08-20T20:42:31.859685lavrinenko.info sshd[20459]: Invalid user password123 from 121.18.85.114 port 33814
2020-08-20T20:42:31.866781lavrinenko.info sshd[20459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.18.85.114
2020-08-20T20:42:31.859685lavrinenko.info sshd[20459]: Invalid user password123 from 121.18.85.114 port 33814
2020-08-20T20:42:34.004974lavrinenko.info sshd[20459]: Failed password for invalid user password123 from 121.18.85.114 port 33814 ssh2
2020-08-20T20:44:56.286918lavrinenko.info sshd[20599]: Invalid user 123456 from 121.18.85.114 port 52440
...
2020-08-21 01:56:56
49.235.132.88 attack
Invalid user web from 49.235.132.88 port 52950
2020-08-21 02:01:49
46.229.168.130 attack
[Fri Aug 21 00:04:22.203405 2020] [:error] [pid 26900:tid 140435020310272] [client 46.229.168.130:12376] [client 46.229.168.130] ModSecurity: Access denied with code 403 (phase 2). Pattern match "((?:[~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\"'\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98`<>][^~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\"'\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98`<>]*?){12})" at ARGS:id. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "1255"] [id "942430"] [msg "Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)"] [data "Matched Data: :prakiraan-cuaca-daerah-malang-dan-batu-seminggu-ke-depan-berlaku-tanggal- found within ARGS:id: 510:prakiraan-cuaca-daerah-malang-dan-batu-seminggu-ke-depan-berlaku-tanggal-21-27-april-2015"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "p
...
2020-08-21 02:07:58
91.93.69.82 attack
Unauthorized connection attempt from IP address 91.93.69.82 on Port 445(SMB)
2020-08-21 02:03:56
128.199.169.90 attack
Invalid user student5 from 128.199.169.90 port 59142
2020-08-21 02:00:44
101.108.177.158 attackspam
Unauthorized connection attempt from IP address 101.108.177.158 on Port 445(SMB)
2020-08-21 01:51:03
203.195.132.128 attackspam
2020-08-20T16:08:11.139398mail.broermann.family sshd[7419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.132.128
2020-08-20T16:08:11.135061mail.broermann.family sshd[7419]: Invalid user operador from 203.195.132.128 port 49328
2020-08-20T16:08:13.489895mail.broermann.family sshd[7419]: Failed password for invalid user operador from 203.195.132.128 port 49328 ssh2
2020-08-20T16:17:14.900164mail.broermann.family sshd[7851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.132.128  user=root
2020-08-20T16:17:16.794200mail.broermann.family sshd[7851]: Failed password for root from 203.195.132.128 port 49438 ssh2
...
2020-08-21 01:49:14
40.77.167.59 attackbotsspam
Automatic report - Banned IP Access
2020-08-21 02:02:56
201.105.196.77 attack
Brute Force
2020-08-21 02:22:44

Recently Reported IPs

246.55.219.203 142.87.74.117 156.17.147.134 95.171.146.83
63.178.120.236 155.225.77.146 64.29.231.246 194.70.75.122
187.182.200.146 220.141.146.244 231.163.156.142 207.96.88.157
78.153.140.203 139.196.204.170 151.146.90.215 59.126.120.179
153.119.100.74 148.241.84.223 174.232.144.153 53.135.176.209