Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.1.189.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19355
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.1.189.214.			IN	A

;; AUTHORITY SECTION:
.			208	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022302 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 09:18:28 CST 2022
;; MSG SIZE  rcvd: 104
Host info
214.189.1.1.in-addr.arpa domain name pointer node-c7q.pool-1-1.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.189.1.1.in-addr.arpa	name = node-c7q.pool-1-1.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
217.219.173.200 attackspam
$f2bV_matches
2020-09-25 07:30:45
51.91.136.28 attackbotsspam
51.91.136.28 - - [24/Sep/2020:21:53:56 +0200] "GET /wp-login.php HTTP/1.1" 200 8558 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.91.136.28 - - [24/Sep/2020:21:53:58 +0200] "POST /wp-login.php HTTP/1.1" 200 8809 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.91.136.28 - - [24/Sep/2020:21:53:59 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-25 07:55:32
27.6.132.231 attackspambots
Listed on    dnsbl-sorbs plus abuseat.org and barracudaCentral   / proto=6  .  srcport=36372  .  dstport=23  .     (3336)
2020-09-25 07:37:40
39.64.215.93 attackspambots
Telnetd brute force attack detected by fail2ban
2020-09-25 07:37:23
24.182.56.22 attackbots
(From sepesch@gmail.com) Hello! I am interested in acupuncture treatment for golfer's elbow injury due to climbing. Possibly to both left and right arms to help maintain even structure. Contacting vis text or phone is preferred! Thanks!
2020-09-25 07:45:00
178.62.23.28 attack
xmlrpc attack
2020-09-25 07:51:49
222.186.30.112 attack
Sep 25 01:31:27 ncomp sshd[18077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
Sep 25 01:31:29 ncomp sshd[18077]: Failed password for root from 222.186.30.112 port 26916 ssh2
Sep 25 01:31:35 ncomp sshd[18079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
Sep 25 01:31:37 ncomp sshd[18079]: Failed password for root from 222.186.30.112 port 11004 ssh2
2020-09-25 07:32:16
34.82.60.66 attackspambots
$f2bV_matches
2020-09-25 07:41:37
37.142.11.85 attackspam
bruteforce detected
2020-09-25 07:22:26
106.12.172.248 attackbotsspam
Sep 24 20:09:57 onepixel sshd[2344290]: Invalid user tony from 106.12.172.248 port 55698
Sep 24 20:09:57 onepixel sshd[2344290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.248 
Sep 24 20:09:57 onepixel sshd[2344290]: Invalid user tony from 106.12.172.248 port 55698
Sep 24 20:09:59 onepixel sshd[2344290]: Failed password for invalid user tony from 106.12.172.248 port 55698 ssh2
Sep 24 20:14:05 onepixel sshd[2344879]: Invalid user laurence from 106.12.172.248 port 59432
2020-09-25 07:26:43
40.117.78.206 attackspambots
Sep 25 01:22:23 fhem-rasp sshd[18289]: Invalid user colaborador from 40.117.78.206 port 47660
...
2020-09-25 07:41:16
104.236.151.120 attackspam
SSH bruteforce attack
2020-09-25 07:24:17
172.245.153.134 attackspambots
trying to access non-authorized port
2020-09-25 07:35:30
189.1.162.121 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-24T21:20:51Z and 2020-09-24T21:38:10Z
2020-09-25 07:35:00
50.236.62.30 attackbots
Invalid user deploy from 50.236.62.30 port 60159
2020-09-25 07:46:50

Recently Reported IPs

1.1.189.210 135.46.182.117 1.1.189.224 1.1.189.226
1.1.189.232 1.1.189.241 1.1.189.243 1.1.189.30
1.1.189.44 1.1.189.52 220.207.87.113 1.1.189.8
1.1.189.84 1.1.189.89 1.1.189.90 1.1.192.114
1.1.192.127 1.1.192.133 1.1.192.15 1.1.192.207