Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.20.214.153
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64308
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.20.214.153.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 16:07:15 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 153.214.20.137.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 137.20.214.153.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
159.89.171.81 attackbots
Jun  6 16:38:32 server sshd[23115]: Failed password for root from 159.89.171.81 port 58006 ssh2
Jun  6 16:42:41 server sshd[23692]: Failed password for root from 159.89.171.81 port 60988 ssh2
...
2020-06-07 01:32:48
195.54.160.213 attack
 TCP (SYN) 195.54.160.213:59446 -> port 13371, len 44
2020-06-07 01:57:17
183.136.225.45 attackspambots
 TCP (SYN) 183.136.225.45:61831 -> port 9876, len 44
2020-06-07 02:03:58
168.158.8.28 attackbotsspam
Ref: mx Logwatch report
2020-06-07 01:45:22
92.62.224.132 attack
 TCP (SYN) 92.62.224.132:51200 -> port 80, len 44
2020-06-07 01:46:11
195.54.160.228 attack
Jun  6 20:48:04 debian kernel: [368244.902825] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=195.54.160.228 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=2341 PROTO=TCP SPT=50060 DPT=33984 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-07 01:56:56
193.35.48.18 attackbotsspam
Jun  6 19:31:41 relay postfix/smtpd\[5185\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  6 19:32:02 relay postfix/smtpd\[5185\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  6 19:32:53 relay postfix/smtpd\[5189\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  6 19:33:09 relay postfix/smtpd\[5185\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  6 19:33:25 relay postfix/smtpd\[5185\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-07 01:38:31
45.55.38.39 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 28 - port: 15592 proto: TCP cat: Misc Attack
2020-06-07 01:41:42
138.197.12.187 attackbotsspam
Jun  6 18:43:43 debian-2gb-nbg1-2 kernel: \[13720571.443043\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=138.197.12.187 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=54321 PROTO=TCP SPT=47891 DPT=7007 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-07 02:06:42
222.89.70.209 attackbots
scans 4 times in preceeding hours on the ports (in chronological order) 51379 42952 3985 17581
2020-06-07 01:53:14
39.109.210.10 attackspam
Brute-force attempt banned
2020-06-07 02:01:40
128.199.134.165 attack
 TCP (SYN) 128.199.134.165:43265 -> port 19673, len 44
2020-06-07 02:07:06
165.22.187.76 attackbots
06/06/2020-12:44:20.272935 165.22.187.76 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-07 02:04:58
66.170.1.42 attackspam
Ref: mx Logwatch report
2020-06-07 01:46:35
111.229.156.243 attackspambots
Brute-force attempt banned
2020-06-07 01:34:49

Recently Reported IPs

26.106.83.40 13.158.180.121 242.39.43.235 41.252.142.89
144.20.18.212 143.95.18.125 6.254.148.144 217.77.60.68
50.89.161.111 6.163.116.72 202.254.123.79 177.74.68.89
38.202.145.148 227.131.157.92 190.126.205.141 160.92.130.22
245.197.174.93 116.161.145.113 234.154.71.168 98.204.119.199