Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.2.214.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 549
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.2.214.152.			IN	A

;; AUTHORITY SECTION:
.			424	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 11:39:09 CST 2022
;; MSG SIZE  rcvd: 104
Host info
152.214.2.1.in-addr.arpa domain name pointer node-h3s.pool-1-2.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
152.214.2.1.in-addr.arpa	name = node-h3s.pool-1-2.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.136.108.22 attack
Unauthorized connection attempt detected from IP address 45.136.108.22 to port 4890
2019-12-31 03:45:06
35.229.206.214 attackspam
Unauthorized connection attempt detected from IP address 35.229.206.214 to port 1433
2019-12-31 03:47:25
187.189.109.138 attackbots
2019-12-13T09:25:53.644721suse-nuc sshd[22310]: Invalid user kerner from 187.189.109.138 port 37252
...
2019-12-31 03:55:02
120.27.27.69 attackbotsspam
Unauthorized connection attempt detected from IP address 120.27.27.69 to port 23
2019-12-31 03:31:02
49.145.193.75 attack
Unauthorized connection attempt detected from IP address 49.145.193.75 to port 445
2019-12-31 03:42:47
37.49.231.168 attackspam
Dec 30 20:28:48 h2177944 kernel: \[932790.459821\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=37.49.231.168 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=6417 PROTO=TCP SPT=50689 DPT=8080 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 30 20:28:48 h2177944 kernel: \[932790.459835\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=37.49.231.168 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=6417 PROTO=TCP SPT=50689 DPT=8080 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 30 20:31:40 h2177944 kernel: \[932961.605732\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=37.49.231.168 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=54042 PROTO=TCP SPT=50689 DPT=83 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 30 20:31:40 h2177944 kernel: \[932961.605746\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=37.49.231.168 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=54042 PROTO=TCP SPT=50689 DPT=83 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 30 20:41:52 h2177944 kernel: \[933574.061680\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=37.49.231.168 DST=85.214.117.9 LEN=40 TOS
2019-12-31 04:03:47
1.215.71.86 attack
Hits on port : 4567
2019-12-31 03:49:29
117.50.6.160 attackbotsspam
Unauthorized connection attempt detected from IP address 117.50.6.160 to port 993
2019-12-31 03:34:07
106.75.64.59 attack
Unauthorized connection attempt detected from IP address 106.75.64.59 to port 993
2019-12-31 03:38:32
24.16.150.253 attack
Dec 30 14:30:26 localhost sshd[48062]: Failed password for invalid user detrick from 24.16.150.253 port 54118 ssh2
Dec 30 15:14:09 localhost sshd[51672]: Failed password for root from 24.16.150.253 port 53220 ssh2
Dec 30 15:44:47 localhost sshd[53617]: Failed password for root from 24.16.150.253 port 36306 ssh2
2019-12-31 03:52:32
118.68.122.74 attackbots
Unauthorized connection attempt detected from IP address 118.68.122.74 to port 445
2019-12-31 03:33:09
95.192.247.104 attackspambots
diesunddas.net 95.192.247.104 [30/Dec/2019:15:44:42 +0100] "POST /xmlrpc.php HTTP/1.0" 301 495 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36"
diesunddas.net 95.192.247.104 [30/Dec/2019:15:44:44 +0100] "POST /xmlrpc.php HTTP/1.0" 200 3643 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36"
2019-12-31 03:51:30
191.34.74.55 attack
2019-12-30T19:38:13.421121shield sshd\[7490\]: Invalid user za from 191.34.74.55 port 58820
2019-12-30T19:38:13.426515shield sshd\[7490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.34.74.55
2019-12-30T19:38:15.557495shield sshd\[7490\]: Failed password for invalid user za from 191.34.74.55 port 58820 ssh2
2019-12-30T19:42:10.076494shield sshd\[8577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.34.74.55  user=root
2019-12-30T19:42:11.741110shield sshd\[8577\]: Failed password for root from 191.34.74.55 port 57763 ssh2
2019-12-31 03:55:47
222.186.175.182 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Failed password for root from 222.186.175.182 port 47080 ssh2
Failed password for root from 222.186.175.182 port 47080 ssh2
Failed password for root from 222.186.175.182 port 47080 ssh2
Failed password for root from 222.186.175.182 port 47080 ssh2
2019-12-31 04:05:33
118.71.236.241 attackspambots
Unauthorized connection attempt detected from IP address 118.71.236.241 to port 23
2019-12-31 03:32:23

Recently Reported IPs

1.2.214.131 1.2.214.208 1.2.214.154 1.2.214.184
1.2.214.245 1.2.214.187 237.7.199.40 1.2.214.214
1.2.215.120 1.2.214.125 103.3.247.63 1.2.215.208
1.2.215.142 1.2.214.50 1.2.216.169 1.2.215.75
1.2.214.56 1.2.216.131 1.2.216.105 1.2.216.190