Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Rio Tinto

Region: Porto

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.210.211.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45836
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.210.211.218.		IN	A

;; AUTHORITY SECTION:
.			532	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020102800 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 28 19:06:42 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 218.211.210.194.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.138, trying next server
;; Got SERVFAIL reply from 100.100.2.136, trying next server
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 218.211.210.194.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
96.251.179.115 attackbotsspam
Invalid user sinusbot from 96.251.179.115 port 41068
2019-10-29 06:52:15
202.39.70.5 attackspambots
Invalid user zxin10 from 202.39.70.5 port 58984
2019-10-29 07:05:16
106.51.2.108 attack
Invalid user serial from 106.51.2.108 port 17153
2019-10-29 06:50:25
129.28.97.252 attackbots
Invalid user markh from 129.28.97.252 port 51138
2019-10-29 06:45:11
192.236.195.87 attackspambots
" "
2019-10-29 06:40:21
109.110.52.77 attack
2019-10-28T22:39:16.150575stark.klein-stark.info sshd\[24030\]: Invalid user applmgr from 109.110.52.77 port 33684
2019-10-28T22:39:16.157572stark.klein-stark.info sshd\[24030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.110.52.77
2019-10-28T22:39:18.814521stark.klein-stark.info sshd\[24030\]: Failed password for invalid user applmgr from 109.110.52.77 port 33684 ssh2
...
2019-10-29 06:50:01
111.231.132.94 attack
Invalid user deploy from 111.231.132.94 port 59120
2019-10-29 06:49:19
35.201.171.166 attackspambots
Invalid user zimbra from 35.201.171.166 port 51026
2019-10-29 07:00:39
129.211.10.228 attackbotsspam
Too many connections or unauthorized access detected from Arctic banned ip
2019-10-29 06:44:51
182.61.176.105 attack
Invalid user quevedo from 182.61.176.105 port 51676
2019-10-29 07:07:36
112.197.0.125 attackspambots
Oct 28 22:51:36 MK-Soft-VM4 sshd[19586]: Failed password for root from 112.197.0.125 port 17551 ssh2
...
2019-10-29 06:48:50
122.165.140.147 attackbots
Invalid user zander from 122.165.140.147 port 34208
2019-10-29 06:45:55
196.27.127.61 attackspam
Invalid user levieux from 196.27.127.61 port 40402
2019-10-29 06:39:48
123.138.18.11 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.18.11  user=root
Failed password for root from 123.138.18.11 port 56668 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.18.11  user=root
Failed password for root from 123.138.18.11 port 50222 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.18.11  user=root
2019-10-29 06:45:40
54.36.183.33 attackspam
$f2bV_matches
2019-10-29 06:57:09

Recently Reported IPs

199.247.1.118 5.23.237.11 178.62.209.194 182.1.234.56
103.133.123.136 143.178.89.219 108.46.1.81 120.59.127.123
167.172.116.232 168.194.37.53 181.118.45.216 187.207.228.61
217.102.187.165 130.0.217.72 220.132.136.166 220.132.166.96
3.236.55.221 31.7.61.188 41.78.90.249 45.228.7.28