Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.106.143.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52675
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;92.106.143.214.			IN	A

;; AUTHORITY SECTION:
.			476	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 04:35:26 CST 2022
;; MSG SIZE  rcvd: 107
Host info
214.143.106.92.in-addr.arpa domain name pointer 214.143.106.92.dynamic.wline.res.cust.swisscom.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.143.106.92.in-addr.arpa	name = 214.143.106.92.dynamic.wline.res.cust.swisscom.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.62.85.150 attackspambots
Invalid user wwwadmin from 185.62.85.150 port 36494
2019-12-26 08:03:25
49.235.239.215 attackbots
Dec 26 01:15:42 51-15-180-239 sshd[21086]: Invalid user guest from 49.235.239.215 port 41068
...
2019-12-26 08:22:40
27.78.12.22 attackbots
Dec 25 02:30:49 XXX sshd[52445]: Invalid user admin from 27.78.12.22 port 2746
2019-12-26 07:59:30
70.26.45.214 attackspam
Lines containing failures of 70.26.45.214
Dec 25 04:55:48 shared09 sshd[4509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.26.45.214  user=r.r
Dec 25 04:55:50 shared09 sshd[4509]: Failed password for r.r from 70.26.45.214 port 54286 ssh2
Dec 25 04:55:50 shared09 sshd[4509]: Received disconnect from 70.26.45.214 port 54286:11: Bye Bye [preauth]
Dec 25 04:55:50 shared09 sshd[4509]: Disconnected from authenticating user r.r 70.26.45.214 port 54286 [preauth]
Dec 25 05:49:03 shared09 sshd[19084]: Invalid user bf from 70.26.45.214 port 44306
Dec 25 05:49:03 shared09 sshd[19084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.26.45.214
Dec 25 05:49:05 shared09 sshd[19084]: Failed password for invalid user bf from 70.26.45.214 port 44306 ssh2
Dec 25 05:49:05 shared09 sshd[19084]: Received disconnect from 70.26.45.214 port 44306:11: Bye Bye [preauth]
Dec 25 05:49:05 shared09 sshd[19084]: Di........
------------------------------
2019-12-26 08:02:31
152.115.62.241 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-26 08:19:18
46.100.230.75 attack
DATE:2019-12-25 23:52:27, IP:46.100.230.75, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-12-26 08:33:40
187.19.155.187 attack
Automatic report - Port Scan Attack
2019-12-26 08:08:48
121.66.224.90 attack
Dec 26 00:53:06 [host] sshd[1876]: Invalid user rebecca from 121.66.224.90
Dec 26 00:53:06 [host] sshd[1876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.224.90
Dec 26 00:53:07 [host] sshd[1876]: Failed password for invalid user rebecca from 121.66.224.90 port 56572 ssh2
2019-12-26 07:57:41
125.161.130.47 attack
1577314354 - 12/25/2019 23:52:34 Host: 125.161.130.47/125.161.130.47 Port: 445 TCP Blocked
2019-12-26 08:25:49
91.134.140.32 attack
Dec 26 01:04:04 serwer sshd\[7982\]: Invalid user josi from 91.134.140.32 port 49660
Dec 26 01:04:04 serwer sshd\[7982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.140.32
Dec 26 01:04:06 serwer sshd\[7982\]: Failed password for invalid user josi from 91.134.140.32 port 49660 ssh2
...
2019-12-26 08:16:13
178.128.221.162 attack
Dec 26 00:49:25 dedicated sshd[27297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.221.162  user=root
Dec 26 00:49:28 dedicated sshd[27297]: Failed password for root from 178.128.221.162 port 60568 ssh2
Dec 26 00:52:18 dedicated sshd[27768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.221.162  user=root
Dec 26 00:52:20 dedicated sshd[27768]: Failed password for root from 178.128.221.162 port 59886 ssh2
Dec 26 00:55:08 dedicated sshd[28212]: Invalid user camera from 178.128.221.162 port 59210
2019-12-26 08:08:04
78.129.156.74 attackbots
0,30-01/01 [bc01/m04] PostRequest-Spammer scoring: Dodoma
2019-12-26 08:34:55
185.156.73.60 attackbots
Dec 26 00:58:03 debian-2gb-nbg1-2 kernel: \[971015.180331\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.156.73.60 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=4696 PROTO=TCP SPT=54074 DPT=33582 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-26 08:04:10
198.27.80.123 attack
Web App Attack
2019-12-26 08:11:21
171.244.52.137 attack
Unauthorised access (Dec 26) SRC=171.244.52.137 LEN=40 TTL=238 ID=8353 TCP DPT=1433 WINDOW=1024 SYN
2019-12-26 08:00:13

Recently Reported IPs

149.102.102.173 202.19.158.1 44.173.237.76 195.59.34.155
120.142.170.219 207.32.213.162 15.77.165.64 78.84.109.57
107.88.225.2 239.189.103.182 224.161.146.116 135.35.190.244
92.68.26.47 5.49.173.137 117.58.106.225 57.139.128.163
100.159.225.107 137.24.76.113 27.191.20.130 145.143.1.74