Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.214.124.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45495
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;92.214.124.216.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 10:25:37 CST 2025
;; MSG SIZE  rcvd: 107
Host info
216.124.214.92.in-addr.arpa domain name pointer ipservice-092-214-124-216.092.214.pools.vodafone-ip.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
216.124.214.92.in-addr.arpa	name = ipservice-092-214-124-216.092.214.pools.vodafone-ip.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.166.223.81 attack
Fail2Ban Ban Triggered
2020-04-06 21:29:52
148.233.136.34 attack
Apr  6 17:45:56 gw1 sshd[29111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.233.136.34
Apr  6 17:45:57 gw1 sshd[29111]: Failed password for invalid user hduser from 148.233.136.34 port 58041 ssh2
...
2020-04-06 20:58:06
222.186.173.201 attackbotsspam
Apr  6 15:16:49 vpn01 sshd[8764]: Failed password for root from 222.186.173.201 port 56492 ssh2
Apr  6 15:16:52 vpn01 sshd[8764]: Failed password for root from 222.186.173.201 port 56492 ssh2
...
2020-04-06 21:21:24
210.71.166.69 attack
Unauthorized connection attempt from IP address 210.71.166.69 on Port 445(SMB)
2020-04-06 21:31:01
51.77.108.92 attackbots
04/06/2020-09:12:29.051402 51.77.108.92 Protocol: 6 ET SCAN Potential SSH Scan
2020-04-06 21:13:25
220.249.48.242 attackbots
Apr  6 08:08:31 finn sshd[17781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.48.242  user=r.r
Apr  6 08:08:32 finn sshd[17781]: Failed password for r.r from 220.249.48.242 port 53988 ssh2
Apr  6 08:08:33 finn sshd[17781]: Received disconnect from 220.249.48.242 port 53988:11: Bye Bye [preauth]
Apr  6 08:08:33 finn sshd[17781]: Disconnected from 220.249.48.242 port 53988 [preauth]
Apr  6 08:21:44 finn sshd[21613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.48.242  user=r.r
Apr  6 08:21:46 finn sshd[21613]: Failed password for r.r from 220.249.48.242 port 33118 ssh2
Apr  6 08:21:46 finn sshd[21613]: Received disconnect from 220.249.48.242 port 33118:11: Bye Bye [preauth]
Apr  6 08:21:46 finn sshd[21613]: Disconnected from 220.249.48.242 port 33118 [preauth]
Apr  6 08:25:23 finn sshd[22870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh rus........
-------------------------------
2020-04-06 21:07:52
45.14.150.51 attackbotsspam
Lines containing failures of 45.14.150.51
Apr  6 15:28:31 mail sshd[15419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.150.51  user=r.r
Apr  6 15:28:34 mail sshd[15419]: Failed password for r.r from 45.14.150.51 port 54482 ssh2
Apr  6 15:28:34 mail sshd[15419]: Received disconnect from 45.14.150.51 port 54482:11: Bye Bye [preauth]
Apr  6 15:28:34 mail sshd[15419]: Disconnected from 45.14.150.51 port 54482 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.14.150.51
2020-04-06 21:00:05
123.25.28.1 attack
Unauthorized connection attempt from IP address 123.25.28.1 on Port 445(SMB)
2020-04-06 21:35:22
120.131.3.119 attackbots
Apr  6 17:58:25 gw1 sshd[29347]: Failed password for root from 120.131.3.119 port 26142 ssh2
...
2020-04-06 21:24:44
111.229.154.180 attackspambots
Apr  6 12:37:03 vlre-nyc-1 sshd\[19928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.154.180  user=root
Apr  6 12:37:05 vlre-nyc-1 sshd\[19928\]: Failed password for root from 111.229.154.180 port 54746 ssh2
Apr  6 12:41:33 vlre-nyc-1 sshd\[20074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.154.180  user=root
Apr  6 12:41:35 vlre-nyc-1 sshd\[20074\]: Failed password for root from 111.229.154.180 port 44354 ssh2
Apr  6 12:45:38 vlre-nyc-1 sshd\[20216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.154.180  user=root
...
2020-04-06 21:20:58
104.237.255.204 attack
Apr  6 14:39:31 vpn01 sshd[7847]: Failed password for root from 104.237.255.204 port 51708 ssh2
...
2020-04-06 20:59:34
117.245.85.6 attack
Unauthorized connection attempt from IP address 117.245.85.6 on Port 445(SMB)
2020-04-06 21:00:55
159.192.143.249 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-04-06 21:03:58
192.144.156.68 attackspambots
Apr  6 09:42:02 vps46666688 sshd[18412]: Failed password for root from 192.144.156.68 port 53574 ssh2
...
2020-04-06 20:56:49
106.75.63.142 attack
Apr  6 07:13:18 server1 sshd\[10878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.63.142  user=root
Apr  6 07:13:21 server1 sshd\[10878\]: Failed password for root from 106.75.63.142 port 37134 ssh2
Apr  6 07:16:28 server1 sshd\[11873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.63.142  user=root
Apr  6 07:16:29 server1 sshd\[11873\]: Failed password for root from 106.75.63.142 port 41442 ssh2
Apr  6 07:19:31 server1 sshd\[13057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.63.142  user=root
...
2020-04-06 21:32:36

Recently Reported IPs

107.245.28.121 23.18.254.69 172.36.226.10 214.210.171.84
84.216.196.67 8.126.10.71 246.114.10.194 94.193.124.57
251.40.38.87 199.54.59.232 8.131.229.147 141.254.219.148
24.240.30.199 30.55.113.124 69.3.168.191 31.173.80.131
214.184.202.209 8.193.115.136 27.136.121.180 127.179.171.87