Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lelystad

Region: Flevoland

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
103.214.57.226 attackbotsspam
SpamScore above: 10.0
2020-05-27 21:32:53
103.214.54.34 attack
spam
2020-03-01 19:14:37
103.214.55.14 attack
Automatic report - Banned IP Access
2019-10-13 07:32:27
103.214.54.34 attackbotsspam
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 08:31:55
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.214.4.0 - 103.214.7.255'

% Abuse contact for '103.214.4.0 - 103.214.7.255' is 'info@hostslim.nl'

inetnum:        103.214.4.0 - 103.214.7.255
netname:        RAKAR-AP
descr:          RAKAR INVESTMENTS HOLDING B.V.
country:        NL
org:            ORG-RIHB1-AP
admin-c:        RIHB1-AP
tech-c:         RIHB1-AP
status:         ALLOCATED PORTABLE
abuse-c:        AR773-AP
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-RAKAR-AP
mnt-routes:     MAINT-RAKAR-AP
mnt-irt:        IRT-RAKAR-AP
last-modified:  2026-01-20T02:42:43Z
source:         APNIC

irt:            IRT-RAKAR-AP
address:        Artemisweg 145-G, Lelystad Flevoland 8239DD
e-mail:         info@hostslim.nl
abuse-mailbox:  info@hostslim.nl
admin-c:        RIHB1-AP
tech-c:         RIHB1-AP
auth:           # Filtered
remarks:        info@hostslim.nl was validated on 2026-01-06
mnt-by:         MAINT-RAKAR-AP
last-modified:  2026-01-06T13:10:23Z
source:         APNIC

organisation:   ORG-RIHB1-AP
org-name:       RAKAR INVESTMENTS HOLDING B.V.
org-type:       LIR
country:        NL
address:        Artemisweg 145-G
phone:          +31320301511
e-mail:         abuse@rakar.nl
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:16:53Z
source:         APNIC

role:           ABUSE RAKARAP
country:        ZZ
address:        Artemisweg 145-G, Lelystad Flevoland 8239DD
phone:          +000000000
e-mail:         info@hostslim.nl
admin-c:        RIHB1-AP
tech-c:         RIHB1-AP
nic-hdl:        AR773-AP
remarks:        Generated from irt object IRT-RAKAR-AP
remarks:        info@hostslim.nl was validated on 2026-01-06
abuse-mailbox:  info@hostslim.nl
mnt-by:         APNIC-ABUSE
last-modified:  2026-01-06T13:10:54Z
source:         APNIC

role:           RAKAR INVESTMENTS HOLDING BV administrator
address:        Artemisweg 145-G, Lelystad Flevoland 8239DD
country:        NL
phone:          +31320301511
fax-no:         +31320301511
e-mail:         abuse@rakar.nl
admin-c:        RIHB1-AP
tech-c:         RIHB1-AP
nic-hdl:        RIHB1-AP
mnt-by:         MAINT-RAKAR-AP
last-modified:  2016-05-18T09:31:32Z
source:         APNIC

% Information related to '103.214.4.0/22AS207083'

route:          103.214.4.0/22
origin:         AS207083
descr:          HostSlim BV
                Artemisweg 145-G
                8239 DD Lelystad
                The Netherlands
mnt-by:         MAINT-RAKAR-AP
last-modified:  2026-01-20T02:41:34Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.214.5.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35327
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.214.5.133.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031602 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 17 12:31:22 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'133.5.214.103.in-addr.arpa has no PTR record
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 133.5.214.103.in-addr.arpa.: No answer

Authoritative answers can be found from:
5.214.103.in-addr.arpa
	origin = dns0.hostslim.nl
	mail addr = dns0.hostslim.nl
	serial = 2025061904
	refresh = 28800
	retry = 7200
	expire = 604800
	minimum = 86400
Related IP info:
Related comments:
IP Type Details Datetime
185.220.101.207 attackspam
IP blocked
2020-09-05 21:52:42
182.185.107.30 attack
Sep  4 18:52:01 mellenthin postfix/smtpd[32306]: NOQUEUE: reject: RCPT from unknown[182.185.107.30]: 554 5.7.1 Service unavailable; Client host [182.185.107.30] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/182.185.107.30; from= to= proto=ESMTP helo=<[182.185.107.30]>
2020-09-05 21:49:10
106.54.52.35 attackbotsspam
(sshd) Failed SSH login from 106.54.52.35 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  5 09:19:01 server sshd[29294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.52.35  user=root
Sep  5 09:19:03 server sshd[29294]: Failed password for root from 106.54.52.35 port 56124 ssh2
Sep  5 09:23:58 server sshd[30549]: Invalid user es from 106.54.52.35 port 39318
Sep  5 09:24:00 server sshd[30549]: Failed password for invalid user es from 106.54.52.35 port 39318 ssh2
Sep  5 09:25:18 server sshd[30960]: Invalid user publish from 106.54.52.35 port 51856
2020-09-05 21:34:43
178.86.210.81 attackspambots
Sep  4 18:51:49 mellenthin postfix/smtpd[32280]: NOQUEUE: reject: RCPT from unknown[178.86.210.81]: 554 5.7.1 Service unavailable; Client host [178.86.210.81] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/178.86.210.81; from= to= proto=ESMTP helo=<[178.86.210.81]>
2020-09-05 21:58:01
54.37.71.203 attackspam
(sshd) Failed SSH login from 54.37.71.203 (FR/France/203.ip-54-37-71.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  5 03:19:37 server sshd[28102]: Failed password for root from 54.37.71.203 port 53028 ssh2
Sep  5 03:33:06 server sshd[510]: Invalid user vlc from 54.37.71.203 port 51796
Sep  5 03:33:08 server sshd[510]: Failed password for invalid user vlc from 54.37.71.203 port 51796 ssh2
Sep  5 03:38:08 server sshd[2168]: Failed password for root from 54.37.71.203 port 59732 ssh2
Sep  5 03:42:45 server sshd[3469]: Invalid user bernd from 54.37.71.203 port 39352
2020-09-05 21:36:51
106.13.123.73 attackspam
Sep  5 15:17:40 vps647732 sshd[978]: Failed password for root from 106.13.123.73 port 48846 ssh2
...
2020-09-05 21:49:52
201.208.54.75 attack
Honeypot attack, port: 445, PTR: 201-208-54-75.genericrev.cantv.net.
2020-09-05 21:42:42
200.2.190.31 attackbotsspam
Sep  4 18:51:40 mellenthin postfix/smtpd[32575]: NOQUEUE: reject: RCPT from unknown[200.2.190.31]: 554 5.7.1 Service unavailable; Client host [200.2.190.31] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/200.2.190.31; from= to= proto=ESMTP helo=<[200.2.190.31]>
2020-09-05 22:03:30
178.128.161.21 attack
SmallBizIT.US 1 packets to tcp(22)
2020-09-05 22:01:11
103.63.215.38 attackbots
Honeypot attack, port: 445, PTR: static-ptr.ehost.vn.
2020-09-05 22:04:44
60.15.67.178 attack
sshd jail - ssh hack attempt
2020-09-05 21:47:01
177.152.124.19 attack
*Port Scan* detected from 177.152.124.19 (BR/Brazil/Minas Gerais/Timóteo/-). 4 hits in the last 50 seconds
2020-09-05 22:07:26
47.52.112.219 attack
3-9-2020 18:45:55	Unauthorized connection attempt (Brute-Force).
3-9-2020 18:45:55	Connection from IP address: 47.52.112.219 on port: 587


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=47.52.112.219
2020-09-05 22:06:35
172.245.186.114 attack
Sep  5 12:27:14 *** sshd[22304]: Did not receive identification string from 172.245.186.114
2020-09-05 21:37:46
65.49.194.40 attack
$f2bV_matches
2020-09-05 21:32:31

Recently Reported IPs

58.65.241.173 217.76.52.30 170.130.204.2 232.37.222.195
198.18.0.14 34.116.184.202 35.166.75.253 20.253.66.3
101.67.49.39 62.60.131.176 81.20.32.84 159.223.155.62
60.16.197.79 34.61.82.184 182.119.229.226 10.90.31.73
20.14.73.168 52.255.41.213 41.110.4.106 69.10.48.159