Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dortmund

Region: Nordrhein-Westfalen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.218.99.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16455
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;92.218.99.121.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011001 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 11 10:09:35 CST 2025
;; MSG SIZE  rcvd: 106
Host info
121.99.218.92.in-addr.arpa domain name pointer ipservice-092-218-099-121.092.218.pools.vodafone-ip.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.99.218.92.in-addr.arpa	name = ipservice-092-218-099-121.092.218.pools.vodafone-ip.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.93.17.149 attackbots
May 31 21:14:42 serwer sshd\[31293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.17.149  user=root
May 31 21:14:44 serwer sshd\[31293\]: Failed password for root from 103.93.17.149 port 43846 ssh2
May 31 21:21:16 serwer sshd\[31993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.17.149  user=root
May 31 21:21:19 serwer sshd\[31993\]: Failed password for root from 103.93.17.149 port 45878 ssh2
May 31 21:24:42 serwer sshd\[32227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.17.149  user=root
May 31 21:24:44 serwer sshd\[32227\]: Failed password for root from 103.93.17.149 port 49574 ssh2
May 31 21:28:10 serwer sshd\[32555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.17.149  user=root
May 31 21:28:12 serwer sshd\[32555\]: Failed password for root from 103.93.17.149 port 532
...
2020-06-01 22:40:01
1.47.41.227 attackbotsspam
2020-03-14 14:16:24 H=\(\[1.47.41.227\]\) \[1.47.41.227\]:52635 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2020-03-14 14:17:39 H=\(\[1.47.41.227\]\) \[1.47.41.227\]:52636 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2020-03-14 14:19:03 H=\(\[1.47.41.227\]\) \[1.47.41.227\]:52637 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-06-01 22:38:53
125.91.109.200 attackbotsspam
Jun  1 16:22:11 legacy sshd[13592]: Failed password for root from 125.91.109.200 port 38218 ssh2
Jun  1 16:24:38 legacy sshd[13727]: Failed password for root from 125.91.109.200 port 36562 ssh2
...
2020-06-01 22:45:41
159.65.11.115 attackspam
Lines containing failures of 159.65.11.115
May 27 18:29:53 shared04 sshd[619]: Invalid user napporn from 159.65.11.115 port 47252
May 27 18:29:53 shared04 sshd[619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.11.115
May 27 18:29:55 shared04 sshd[619]: Failed password for invalid user napporn from 159.65.11.115 port 47252 ssh2
May 27 18:29:55 shared04 sshd[619]: Received disconnect from 159.65.11.115 port 47252:11: Bye Bye [preauth]
May 27 18:29:55 shared04 sshd[619]: Disconnected from invalid user napporn 159.65.11.115 port 47252 [preauth]
May 27 19:02:52 shared04 sshd[13591]: Invalid user test from 159.65.11.115 port 33030
May 27 19:02:52 shared04 sshd[13591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.11.115
May 27 19:02:54 shared04 sshd[13591]: Failed password for invalid user test from 159.65.11.115 port 33030 ssh2
May 27 19:02:54 shared04 sshd[13591]: Received dis........
------------------------------
2020-06-01 23:00:44
163.53.183.34 attackbots
Jun  1 15:08:07 vpn01 sshd[11798]: Failed password for root from 163.53.183.34 port 48556 ssh2
...
2020-06-01 22:30:36
210.97.40.44 attackbots
fail2ban -- 210.97.40.44
...
2020-06-01 22:51:19
157.97.80.205 attackbotsspam
Jun  1 15:11:07 server sshd[22776]: Failed password for root from 157.97.80.205 port 37075 ssh2
Jun  1 15:14:49 server sshd[22958]: Failed password for root from 157.97.80.205 port 39514 ssh2
...
2020-06-01 23:12:50
188.166.117.213 attackspam
$f2bV_matches
2020-06-01 23:06:21
146.164.51.53 attack
Jun  1 11:35:29 ns sshd[22111]: Connection from 146.164.51.53 port 36812 on 134.119.39.98 port 22
Jun  1 11:35:31 ns sshd[22111]: User r.r from 146.164.51.53 not allowed because not listed in AllowUsers
Jun  1 11:35:31 ns sshd[22111]: Failed password for invalid user r.r from 146.164.51.53 port 36812 ssh2
Jun  1 11:35:31 ns sshd[22111]: Received disconnect from 146.164.51.53 port 36812:11: Bye Bye [preauth]
Jun  1 11:35:31 ns sshd[22111]: Disconnected from 146.164.51.53 port 36812 [preauth]
Jun  1 11:39:41 ns sshd[8413]: Connection from 146.164.51.53 port 37166 on 134.119.39.98 port 22
Jun  1 11:39:43 ns sshd[8413]: User r.r from 146.164.51.53 not allowed because not listed in AllowUsers
Jun  1 11:39:43 ns sshd[8413]: Failed password for invalid user r.r from 146.164.51.53 port 37166 ssh2
Jun  1 11:39:43 ns sshd[8413]: Received disconnect from 146.164.51.53 port 37166:11: Bye Bye [preauth]
Jun  1 11:39:43 ns sshd[8413]: Disconnected from 146.164.51.53 port 37166 [preaut........
-------------------------------
2020-06-01 23:11:26
112.213.33.197 attackbotsspam
112.213.33.197 - - [01/Jun/2020:15:31:16 +0200] "POST /wp-login.php HTTP/1.1" 200 3432 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
112.213.33.197 - - [01/Jun/2020:15:31:19 +0200] "POST /wp-login.php HTTP/1.1" 200 3411 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-01 23:09:47
89.218.204.194 attack
imap-login: Disconnected \(auth failed, 1 attempts in 6
2020-06-01 22:49:34
212.83.166.62 attackbotsspam
Sending illegal POST request from possible spammer.
2020-06-01 22:55:42
79.137.82.213 attack
Jun  1 07:09:21 server1 sshd\[26029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.82.213  user=root
Jun  1 07:09:23 server1 sshd\[26029\]: Failed password for root from 79.137.82.213 port 45960 ssh2
Jun  1 07:12:52 server1 sshd\[27297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.82.213  user=root
Jun  1 07:12:55 server1 sshd\[27297\]: Failed password for root from 79.137.82.213 port 51074 ssh2
Jun  1 07:16:17 server1 sshd\[28372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.82.213  user=root
...
2020-06-01 22:32:18
167.172.185.179 attackbotsspam
fail2ban -- 167.172.185.179
...
2020-06-01 22:57:46
157.245.133.78 attackspam
CMS (WordPress or Joomla) login attempt.
2020-06-01 22:43:58

Recently Reported IPs

203.83.79.96 178.58.100.121 104.192.231.255 4.249.58.130
205.198.57.197 72.149.63.238 252.76.74.84 208.69.32.212
236.238.179.144 144.138.45.52 61.0.171.190 65.142.204.120
221.197.191.199 29.29.87.248 228.146.84.55 243.216.72.211
114.106.69.164 40.165.210.254 122.159.126.6 226.76.115.26