Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: 1&1 Telecom GmbH

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
repeated ssh bruteforce attempts
2020-04-14 08:39:07
Comments on same subnet:
IP Type Details Datetime
92.116.141.214 attackspam
Scanning
2020-01-16 05:12:21
92.116.147.81 attack
Scanning
2019-12-13 21:48:12
92.116.141.216 attackspambots
firewall-block, port(s): 2323/tcp
2019-08-10 13:47:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.116.14.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50250
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;92.116.14.104.			IN	A

;; AUTHORITY SECTION:
.			578	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020041302 1800 900 604800 86400

;; Query time: 513 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 14 08:39:04 CST 2020
;; MSG SIZE  rcvd: 117
Host info
104.14.116.92.in-addr.arpa domain name pointer i5C740E68.versanet.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.14.116.92.in-addr.arpa	name = i5C740E68.versanet.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.252.94.108 attackbotsspam
Brute force attempt
2019-11-16 01:48:33
104.206.128.58 attack
Port scan
2019-11-16 01:43:46
104.206.128.38 attack
Port scan
2019-11-16 01:58:52
63.80.189.137 attack
Autoban   63.80.189.137 AUTH/CONNECT
2019-11-16 01:45:53
104.244.72.98 attack
Port scan
2019-11-16 01:25:17
92.63.194.75 attackbotsspam
RDP Bruteforce
2019-11-16 01:35:17
206.189.122.133 attackspam
Nov 15 18:20:48 ns41 sshd[26297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.122.133
2019-11-16 01:47:51
106.51.2.108 attackspambots
Nov 15 17:31:33 localhost sshd\[47110\]: Invalid user admin from 106.51.2.108 port 60161
Nov 15 17:31:33 localhost sshd\[47110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.2.108
Nov 15 17:31:34 localhost sshd\[47110\]: Failed password for invalid user admin from 106.51.2.108 port 60161 ssh2
Nov 15 17:35:56 localhost sshd\[47241\]: Invalid user admin from 106.51.2.108 port 6049
Nov 15 17:35:56 localhost sshd\[47241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.2.108
...
2019-11-16 01:56:18
193.70.43.220 attackspambots
2019-11-15T17:31:58.628300abusebot.cloudsearch.cf sshd\[30815\]: Invalid user havyn from 193.70.43.220 port 60808
2019-11-16 01:37:41
122.181.215.196 attackbotsspam
SSH-bruteforce attempts
2019-11-16 01:19:55
218.92.0.145 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Failed password for root from 218.92.0.145 port 37605 ssh2
Failed password for root from 218.92.0.145 port 37605 ssh2
Failed password for root from 218.92.0.145 port 37605 ssh2
Failed password for root from 218.92.0.145 port 37605 ssh2
2019-11-16 01:19:34
46.28.0.150 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-16 01:47:14
106.12.69.99 attackspambots
2019-11-15T17:21:49.363610abusebot-3.cloudsearch.cf sshd\[8509\]: Invalid user galassi from 106.12.69.99 port 58944
2019-11-16 01:34:07
43.249.194.245 attackspambots
2019-11-15T15:14:56.200834abusebot-5.cloudsearch.cf sshd\[17704\]: Invalid user fd from 43.249.194.245 port 26648
2019-11-16 02:04:22
194.152.206.93 attackbotsspam
Invalid user nfs from 194.152.206.93 port 35175
2019-11-16 01:29:56

Recently Reported IPs

162.141.185.83 156.183.135.143 198.220.168.197 134.209.242.156
192.168.1.105 188.166.16.36 106.12.18.125 45.82.254.178
178.172.235.81 168.62.10.123 201.243.133.123 168.61.191.109
123.122.112.134 177.91.84.17 183.89.215.17 24.90.143.249
0.64.104.73 219.250.188.143 156.140.126.100 107.171.75.58