Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Utrecht

Region: Utrecht

Country: Netherlands

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.2.252.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36690
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.2.252.214.			IN	A

;; AUTHORITY SECTION:
.			512	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012300 1800 900 604800 86400

;; Query time: 431 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 23 21:42:41 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 214.252.2.144.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.252.2.144.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
124.31.238.151 attack
02/07/2020-17:36:26.359710 124.31.238.151 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-08 09:48:00
181.197.191.20 attack
Email rejected due to spam filtering
2020-02-08 09:38:44
198.199.79.17 attackbots
Feb  7 23:36:03 haigwepa sshd[27374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.79.17 
Feb  7 23:36:05 haigwepa sshd[27374]: Failed password for invalid user xac from 198.199.79.17 port 47912 ssh2
...
2020-02-08 10:07:42
81.82.206.251 attackspambots
37215/tcp
[2020-02-07]1pkt
2020-02-08 09:53:49
2.38.186.191 attack
23/tcp
[2020-02-07]1pkt
2020-02-08 09:41:57
138.97.87.105 attackspambots
Email rejected due to spam filtering
2020-02-08 09:39:02
142.93.48.216 attackspambots
WordPress login Brute force / Web App Attack on client site.
2020-02-08 09:59:21
159.203.69.48 attack
SSH / Telnet Brute Force Attempts on Honeypot
2020-02-08 09:51:21
103.15.106.120 attackbots
Port probing on unauthorized port 1433
2020-02-08 09:36:40
140.246.207.140 attackbotsspam
SASL PLAIN auth failed: ruser=...
2020-02-08 09:45:18
78.187.33.18 attack
8080/tcp
[2020-02-07]1pkt
2020-02-08 10:09:46
76.102.21.32 attackbots
65193/udp
[2020-02-07]1pkt
2020-02-08 10:13:48
213.227.134.8 attackspam
" "
2020-02-08 09:37:59
181.40.76.162 attackbotsspam
Feb  8 01:09:11 *** sshd[32529]: Invalid user fgf from 181.40.76.162
2020-02-08 10:02:48
92.115.141.236 attackbots
ssh intrusion attempt
2020-02-08 09:49:46

Recently Reported IPs

33.234.98.107 210.140.172.71 68.218.211.184 109.41.9.1
13.245.14.250 214.47.122.215 220.176.232.201 2.51.36.63
82.136.149.196 228.43.141.216 21.117.45.198 130.28.152.36
106.154.224.172 186.41.137.124 140.86.2.18 195.185.18.28
240.15.1.201 9.89.139.169 72.109.135.53 182.1.199.28