Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.136.138.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47796
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.136.138.214.			IN	A

;; AUTHORITY SECTION:
.			389	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091502 1800 900 604800 86400

;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 11:21:28 CST 2022
;; MSG SIZE  rcvd: 106
Host info
214.138.136.2.in-addr.arpa domain name pointer 214.red-2-136-138.staticip.rima-tde.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.138.136.2.in-addr.arpa	name = 214.red-2-136-138.staticip.rima-tde.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
68.183.209.123 attackspam
Sep  5 07:39:29 dedicated sshd[9652]: Invalid user minecraft from 68.183.209.123 port 51994
2019-09-05 13:44:41
113.172.221.226 attackspambots
Sep  5 01:56:42 www sshd\[18812\]: Invalid user admin from 113.172.221.226
Sep  5 01:56:42 www sshd\[18812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.172.221.226
Sep  5 01:56:45 www sshd\[18812\]: Failed password for invalid user admin from 113.172.221.226 port 49035 ssh2
...
2019-09-05 13:52:56
206.81.19.96 attackspambots
Sep  4 19:13:00 plusreed sshd[26690]: Invalid user junk from 206.81.19.96
...
2019-09-05 13:16:13
190.158.201.33 attack
Sep  5 00:52:19 SilenceServices sshd[6215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.158.201.33
Sep  5 00:52:21 SilenceServices sshd[6215]: Failed password for invalid user tester from 190.158.201.33 port 51774 ssh2
Sep  5 00:56:32 SilenceServices sshd[8596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.158.201.33
2019-09-05 14:02:00
80.241.222.166 attackspam
Sep  5 08:03:50 yabzik sshd[16685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.241.222.166
Sep  5 08:03:52 yabzik sshd[16685]: Failed password for invalid user dev from 80.241.222.166 port 36394 ssh2
Sep  5 08:08:34 yabzik sshd[18239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.241.222.166
2019-09-05 13:12:56
196.15.211.92 attackbotsspam
Reported by AbuseIPDB proxy server.
2019-09-05 13:27:12
218.98.40.138 attack
2019-09-05T05:41:52.445004abusebot-4.cloudsearch.cf sshd\[17508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.138  user=root
2019-09-05 13:42:54
123.10.64.218 attack
Sep  5 00:23:31 mail1 sshd[12412]: Invalid user postgres from 123.10.64.218 port 57732
Sep  5 00:23:31 mail1 sshd[12412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.10.64.218
Sep  5 00:23:33 mail1 sshd[12412]: Failed password for invalid user postgres from 123.10.64.218 port 57732 ssh2
Sep  5 00:23:33 mail1 sshd[12412]: Received disconnect from 123.10.64.218 port 57732:11: Bye Bye [preauth]
Sep  5 00:23:33 mail1 sshd[12412]: Disconnected from 123.10.64.218 port 57732 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.10.64.218
2019-09-05 13:20:36
106.52.185.236 attackbotsspam
Sep  5 00:14:37 xxxxxxx0 sshd[12073]: Invalid user sinusbot from 106.52.185.236 port 45396
Sep  5 00:14:37 xxxxxxx0 sshd[12073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.185.236
Sep  5 00:14:39 xxxxxxx0 sshd[12073]: Failed password for invalid user sinusbot from 106.52.185.236 port 45396 ssh2
Sep  5 00:28:46 xxxxxxx0 sshd[17345]: Invalid user test from 106.52.185.236 port 40322
Sep  5 00:28:46 xxxxxxx0 sshd[17345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.185.236

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.52.185.236
2019-09-05 13:56:55
162.243.20.243 attack
Sep  4 19:35:09 tdfoods sshd\[10137\]: Invalid user guest from 162.243.20.243
Sep  4 19:35:09 tdfoods sshd\[10137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.20.243
Sep  4 19:35:11 tdfoods sshd\[10137\]: Failed password for invalid user guest from 162.243.20.243 port 47398 ssh2
Sep  4 19:39:43 tdfoods sshd\[10599\]: Invalid user mc3 from 162.243.20.243
Sep  4 19:39:43 tdfoods sshd\[10599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.20.243
2019-09-05 13:43:24
159.89.55.126 attackspam
Sep  4 19:39:45 hanapaa sshd\[30428\]: Invalid user tomtom from 159.89.55.126
Sep  4 19:39:45 hanapaa sshd\[30428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.55.126
Sep  4 19:39:47 hanapaa sshd\[30428\]: Failed password for invalid user tomtom from 159.89.55.126 port 56206 ssh2
Sep  4 19:43:37 hanapaa sshd\[30758\]: Invalid user 123 from 159.89.55.126
Sep  4 19:43:37 hanapaa sshd\[30758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.55.126
2019-09-05 13:54:43
84.0.0.18 attackspam
Automatic report - Port Scan Attack
2019-09-05 13:21:47
66.183.127.247 attackspambots
Sep  5 07:40:31 server sshd\[19143\]: Invalid user default from 66.183.127.247 port 48524
Sep  5 07:40:31 server sshd\[19143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.183.127.247
Sep  5 07:40:34 server sshd\[19143\]: Failed password for invalid user default from 66.183.127.247 port 48524 ssh2
Sep  5 07:45:27 server sshd\[24458\]: Invalid user proxyuser from 66.183.127.247 port 37006
Sep  5 07:45:27 server sshd\[24458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.183.127.247
2019-09-05 13:05:06
110.4.45.222 attack
fail2ban honeypot
2019-09-05 13:08:57
185.211.245.170 attackbots
Sep  5 06:43:51 mail postfix/smtpd\[2164\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  5 06:44:11 mail postfix/smtpd\[2134\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  5 07:14:24 mail postfix/smtpd\[3611\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  5 07:52:16 mail postfix/smtpd\[4076\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-09-05 13:52:29

Recently Reported IPs

193.233.229.66 172.104.159.47 5.154.174.188 180.122.43.110
183.250.223.57 211.196.85.40 114.218.224.51 14.169.126.65
160.20.147.150 163.172.26.250 104.168.158.57 104.227.6.21
121.236.96.228 121.29.248.23 38.94.253.26 37.44.196.204
115.118.243.61 87.103.130.59 95.6.77.23 84.245.205.167