Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Brookings

Region: South Dakota

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: South Dakota State University

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.216.200.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6926
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;137.216.200.14.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070801 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jul 09 01:35:10 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 14.200.216.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 14.200.216.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
77.40.3.246 attackbots
failed_logins
2020-08-11 16:43:15
37.49.229.213 attack
[portscan] tcp/22 [SSH]
[portscan] tcp/23 [TELNET]
[scan/connect: 2 time(s)]
in blocklist.de:'listed [*unkn*]'
*(RWIN=1024)(08110942)
2020-08-11 16:25:36
190.12.66.27 attackbots
*Port Scan* detected from 190.12.66.27 (PE/Peru/Lima region/San Francisco De Borja (Santa Catalina)/-). 4 hits in the last 90 seconds
2020-08-11 16:27:59
118.24.149.173 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-11T03:40:39Z and 2020-08-11T03:52:09Z
2020-08-11 16:32:39
157.34.32.77 attackspambots
(mod_security) mod_security (id:240335) triggered by 157.34.32.77 (IN/India/-): 5 in the last 3600 secs
2020-08-11 16:22:53
136.233.20.197 attackspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-08-11 16:24:33
2a01:4f8:190:14ed::2 attack
20 attempts against mh-misbehave-ban on cedar
2020-08-11 16:37:33
159.65.224.137 attack
SIP/5060 Probe, BF, Hack -
2020-08-11 17:01:40
101.65.160.121 attackbots
Excessive Port-Scanning
2020-08-11 16:59:26
159.65.155.255 attackbotsspam
Aug 11 09:05:06 lukav-desktop sshd\[7070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.255  user=root
Aug 11 09:05:08 lukav-desktop sshd\[7070\]: Failed password for root from 159.65.155.255 port 38146 ssh2
Aug 11 09:09:39 lukav-desktop sshd\[5562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.255  user=root
Aug 11 09:09:42 lukav-desktop sshd\[5562\]: Failed password for root from 159.65.155.255 port 48764 ssh2
Aug 11 09:14:17 lukav-desktop sshd\[25502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.255  user=root
2020-08-11 16:19:11
52.170.129.77 attackspam
 TCP (SYN) 52.170.129.77:20918 -> port 23, len 44
2020-08-11 16:51:59
223.71.167.163 attackspam
scan
2020-08-11 16:55:48
196.52.43.106 attackbots
Unauthorized connection attempt from IP address 196.52.43.106 on Port 139(NETBIOS)
2020-08-11 16:45:53
189.18.243.210 attack
fail2ban -- 189.18.243.210
...
2020-08-11 16:37:55
89.25.234.8 attackbots
failed_logins
2020-08-11 16:44:57

Recently Reported IPs

134.179.244.153 197.0.124.169 167.100.103.191 139.93.177.166
159.104.25.213 128.139.205.168 79.69.183.65 212.64.83.74
182.72.161.90 185.19.221.243 27.213.117.30 36.82.96.212
221.19.188.98 137.5.122.81 35.132.183.225 89.204.194.4
36.80.40.24 240e:ec:65e0:5161:2081:cef3:a890:ec26 223.206.232.110 160.128.198.45