Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.214.101.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14130
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;92.214.101.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:25:19 CST 2025
;; MSG SIZE  rcvd: 107
Host info
159.101.214.92.in-addr.arpa domain name pointer ipservice-092-214-101-159.092.214.pools.vodafone-ip.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.101.214.92.in-addr.arpa	name = ipservice-092-214-101-159.092.214.pools.vodafone-ip.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.190.99.68 attackbotsspam
Unauthorized connection attempt from IP address 187.190.99.68 on Port 445(SMB)
2020-10-09 05:44:43
111.229.76.239 attack
DATE:2020-10-08 22:19:23,IP:111.229.76.239,MATCHES:10,PORT:ssh
2020-10-09 06:06:53
190.206.121.81 attackbotsspam
Unauthorized connection attempt from IP address 190.206.121.81 on Port 445(SMB)
2020-10-09 05:46:07
222.186.171.247 attack
 TCP (SYN) 222.186.171.247:54419 -> port 18283, len 44
2020-10-09 06:16:30
81.70.21.113 attackspambots
(sshd) Failed SSH login from 81.70.21.113 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  8 22:27:23 server sshd[24400]: Invalid user rob from 81.70.21.113
Oct  8 22:27:23 server sshd[24400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.70.21.113 
Oct  8 22:27:25 server sshd[24400]: Failed password for invalid user rob from 81.70.21.113 port 41866 ssh2
Oct  8 22:39:59 server sshd[26469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.70.21.113  user=root
Oct  8 22:40:01 server sshd[26469]: Failed password for root from 81.70.21.113 port 39022 ssh2
2020-10-09 05:52:12
218.92.0.133 attackbots
Oct  8 23:46:52 amit sshd\[18454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
Oct  8 23:46:54 amit sshd\[18454\]: Failed password for root from 218.92.0.133 port 28322 ssh2
Oct  8 23:47:12 amit sshd\[23609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
...
2020-10-09 05:49:23
196.190.116.76 attackspambots
Attempted connection to port 445.
2020-10-09 06:09:31
85.159.218.246 attack
Oct  8 21:27:04 cho postfix/smtpd[250293]: warning: unknown[85.159.218.246]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  8 21:27:10 cho postfix/smtpd[250293]: warning: unknown[85.159.218.246]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  8 21:27:20 cho postfix/smtpd[250293]: warning: unknown[85.159.218.246]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  8 21:27:43 cho postfix/smtpd[250293]: warning: unknown[85.159.218.246]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  8 21:27:49 cho postfix/smtpd[250293]: warning: unknown[85.159.218.246]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-09 05:47:13
185.81.158.101 attack
Attempted connection to port 445.
2020-10-09 06:14:44
51.254.22.161 attackbotsspam
Oct  8 21:24:11 lnxweb62 sshd[1960]: Failed password for root from 51.254.22.161 port 58666 ssh2
Oct  8 21:27:35 lnxweb62 sshd[3567]: Failed password for root from 51.254.22.161 port 36784 ssh2
Oct  8 21:30:45 lnxweb62 sshd[5170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.22.161
2020-10-09 05:52:29
222.186.30.76 attack
Oct  8 18:45:33 shivevps sshd[29619]: Failed password for root from 222.186.30.76 port 26509 ssh2
Oct  8 18:45:39 shivevps sshd[29621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Oct  8 18:45:41 shivevps sshd[29621]: Failed password for root from 222.186.30.76 port 27291 ssh2
...
2020-10-09 05:50:42
88.97.9.2 attackspam
Attempted connection to port 445.
2020-10-09 05:57:01
41.32.23.28 attackspam
Unauthorized connection attempt from IP address 41.32.23.28 on Port 445(SMB)
2020-10-09 05:53:03
193.187.92.67 attackspam
SS5,Magento Bruteforce Login Attack POST /index.php/admin/
2020-10-09 06:09:55
223.75.68.18 attack
 TCP (SYN) 223.75.68.18:42604 -> port 1433, len 40
2020-10-09 06:06:03

Recently Reported IPs

147.254.150.39 26.76.185.205 231.45.213.2 254.40.235.203
53.155.194.87 228.103.39.54 223.156.168.235 27.175.126.52
17.227.38.220 37.162.30.78 216.48.213.41 80.135.14.3
235.147.137.27 44.9.68.156 188.211.134.30 198.1.144.58
4.229.112.157 245.221.216.174 52.234.178.5 77.166.243.136