Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Nigeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '102.217.236.0 - 102.217.236.255'

% No abuse contact registered for 102.217.236.0 - 102.217.236.255

inetnum:        102.217.236.0 - 102.217.236.255
netname:        KAOPUCLOUD-ZA
descr:          KAOPUCLOUD Data Center
country:        ZA
admin-c:        HW11-AFRINIC
tech-c:         HW11-AFRINIC
status:         ASSIGNED PA
mnt-by:         KCL2-MNT
source:         AFRINIC # Filtered
parent:         102.217.236.0 - 102.217.239.255

person:         Hongjie Wu
nic-hdl:        HW11-AFRINIC
address:        12 Bolaji Taylor Street , off Obawde road, Aruna, Ogba Ikeja, Lagos Nigeria
address:        lagos
address:        Nigeria
phone:          tel:+86-152-8005-6043
phone:          tel:+86-189-7940-1626
mnt-by:         GENERATED-HLQNCEBQDWZGA5QX1NYMY2COCDHUWMXZ-MNT
source:         AFRINIC # Filtered

% Information related to '102.217.236.0/24AS138915'

route:          102.217.236.0/24
origin:         AS138915
descr:          Kaopu Cloud Inc Data Center
mnt-by:         KCL2-MNT
source:         AFRINIC # Filtered
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.217.236.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33133
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.217.236.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040900 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 09 18:59:25 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 7.236.217.102.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.236.217.102.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
140.82.17.48 attack
Exploited Host.
2020-07-26 00:20:15
49.146.33.84 attack
Honeypot attack, port: 445, PTR: dsl.49.146.33.84.pldt.net.
2020-07-26 00:18:06
122.51.52.154 attack
IP blocked
2020-07-26 00:09:38
140.143.247.30 attackspam
Failed password for invalid user leo from 140.143.247.30 port 43656 ssh2
2020-07-26 00:34:30
178.128.92.109 attack
Jul 25 17:13:21 icinga sshd[16853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.92.109 
Jul 25 17:13:23 icinga sshd[16853]: Failed password for invalid user ew from 178.128.92.109 port 48178 ssh2
Jul 25 17:15:50 icinga sshd[21708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.92.109 
...
2020-07-26 00:14:40
14.139.86.166 attackbots
Invalid user sm from 14.139.86.166 port 45766
2020-07-26 00:35:22
81.29.214.123 attackspam
Jul 25 17:55:33 vpn01 sshd[7458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.29.214.123
Jul 25 17:55:35 vpn01 sshd[7458]: Failed password for invalid user ec2-user from 81.29.214.123 port 56258 ssh2
...
2020-07-26 00:13:07
104.121.187.101 attackspambots
trying to access non-authorized port
2020-07-26 00:17:14
114.40.36.198 attackbots
20/7/25@11:16:02: FAIL: Alarm-Network address from=114.40.36.198
20/7/25@11:16:03: FAIL: Alarm-Network address from=114.40.36.198
...
2020-07-26 00:10:04
141.136.92.249 attack
Exploited Host.
2020-07-26 00:09:18
116.206.14.51 attack
Unauthorized connection attempt from IP address 116.206.14.51 on Port 445(SMB)
2020-07-25 23:50:18
47.88.148.177 attackspambots
Jul 25 15:47:24 plex-server sshd[2662914]: Invalid user mariadb from 47.88.148.177 port 49839
Jul 25 15:47:24 plex-server sshd[2662914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.88.148.177 
Jul 25 15:47:24 plex-server sshd[2662914]: Invalid user mariadb from 47.88.148.177 port 49839
Jul 25 15:47:26 plex-server sshd[2662914]: Failed password for invalid user mariadb from 47.88.148.177 port 49839 ssh2
Jul 25 15:50:09 plex-server sshd[2664111]: Invalid user sfr from 47.88.148.177 port 40892
...
2020-07-25 23:56:32
140.249.18.118 attack
Exploited Host.
2020-07-26 00:22:27
222.186.30.59 attackbotsspam
Jul 25 20:49:54 gw1 sshd[18375]: Failed password for root from 222.186.30.59 port 64570 ssh2
...
2020-07-25 23:51:19
37.152.181.57 attack
Jul 25 17:46:39 ns382633 sshd\[32065\]: Invalid user angelique from 37.152.181.57 port 33284
Jul 25 17:46:39 ns382633 sshd\[32065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.181.57
Jul 25 17:46:40 ns382633 sshd\[32065\]: Failed password for invalid user angelique from 37.152.181.57 port 33284 ssh2
Jul 25 17:56:25 ns382633 sshd\[1405\]: Invalid user nginx from 37.152.181.57 port 56780
Jul 25 17:56:25 ns382633 sshd\[1405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.181.57
2020-07-25 23:57:49

Recently Reported IPs

3.227.180.70 106.112.132.130 35.198.216.19 67.207.93.150
144.52.197.172 108.181.22.243 218.140.54.73 14.188.83.127
142.93.157.146 64.227.2.203 134.199.200.219 61.136.144.34
234.63.172.29 56.58.58.239 139.135.40.4 23.225.213.68
231.191.77.188 144.31.48.59 43.128.103.68 172.234.203.40