Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dresden

Region: Sachsen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.211.142.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42912
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;92.211.142.219.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121100 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 11 17:47:26 CST 2024
;; MSG SIZE  rcvd: 107
Host info
219.142.211.92.in-addr.arpa domain name pointer ipservice-092-211-142-219.092.211.pools.vodafone-ip.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
219.142.211.92.in-addr.arpa	name = ipservice-092-211-142-219.092.211.pools.vodafone-ip.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.24.35.250 attackbots
Honeypot attack, port: 445, PTR: node-73u.pool-125-24.dynamic.totinternet.net.
2020-06-11 21:00:10
14.63.167.192 attackspambots
Jun 11 14:12:41 ns381471 sshd[2040]: Failed password for root from 14.63.167.192 port 35590 ssh2
2020-06-11 20:40:41
111.229.103.67 attack
Jun 11 13:48:35 gestao sshd[10209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.103.67 
Jun 11 13:48:37 gestao sshd[10209]: Failed password for invalid user admin from 111.229.103.67 port 53930 ssh2
Jun 11 13:52:47 gestao sshd[10390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.103.67 
...
2020-06-11 21:04:31
87.106.79.198 attack
Repeated RDP login failures. Last user: administrator
2020-06-11 20:46:32
34.235.178.200 attackspam
2020-06-11T12:27:19.133737shield sshd\[24509\]: Invalid user wuwei from 34.235.178.200 port 56176
2020-06-11T12:27:19.137753shield sshd\[24509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-34-235-178-200.compute-1.amazonaws.com
2020-06-11T12:27:21.259423shield sshd\[24509\]: Failed password for invalid user wuwei from 34.235.178.200 port 56176 ssh2
2020-06-11T12:30:41.189137shield sshd\[25463\]: Invalid user sshadmin from 34.235.178.200 port 33022
2020-06-11T12:30:41.192984shield sshd\[25463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-34-235-178-200.compute-1.amazonaws.com
2020-06-11 20:36:31
37.151.83.25 attackbots
Unauthorized connection attempt from IP address 37.151.83.25 on Port 445(SMB)
2020-06-11 21:14:45
190.143.119.228 attackbots
Repeated RDP login failures. Last user: administrator
2020-06-11 20:52:44
213.248.151.143 attackspambots
Repeated RDP login failures. Last user: administrator
2020-06-11 20:50:52
5.135.92.131 attack
Repeated RDP login failures. Last user: administrator
2020-06-11 21:01:33
196.250.1.5 attack
Repeated RDP login failures. Last user: Administrator
2020-06-11 20:43:58
51.75.146.114 attack
VoIP Brute Force - 51.75.146.114 - Auto Report
...
2020-06-11 20:39:37
122.51.18.119 attackspam
Jun 11 12:14:50 IngegnereFirenze sshd[17393]: Failed password for invalid user iinstall from 122.51.18.119 port 51724 ssh2
...
2020-06-11 20:32:19
51.223.61.207 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-11 20:39:56
185.172.66.28 attackspambots
Repeated RDP login failures. Last user: administrator
2020-06-11 20:44:48
200.6.174.249 attackspam
Repeated RDP login failures. Last user: administrator
2020-06-11 20:51:41

Recently Reported IPs

75.197.95.226 244.49.169.12 71.88.184.91 226.22.2.137
157.228.199.87 200.114.3.85 225.23.253.147 202.17.140.64
121.35.208.12 249.65.116.3 160.76.242.135 4.194.223.61
202.169.204.13 199.42.82.231 73.36.205.144 124.167.150.109
21.153.201.239 152.191.185.225 232.160.100.146 185.178.138.7