Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.214.112.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4634
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.214.112.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 12:10:43 CST 2025
;; MSG SIZE  rcvd: 105
Host info
20.112.214.2.in-addr.arpa domain name pointer dynamic-002-214-112-020.2.214.pool.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.112.214.2.in-addr.arpa	name = dynamic-002-214-112-020.2.214.pool.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
146.185.149.245 attackbots
Jul  9 23:00:39 core01 sshd\[15900\]: Invalid user theorist from 146.185.149.245 port 58098
Jul  9 23:00:39 core01 sshd\[15900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.149.245
...
2019-07-10 05:26:03
195.24.138.218 attackbots
Caught in portsentry honeypot
2019-07-10 05:39:50
18.85.192.253 attackspam
$f2bV_matches
2019-07-10 05:35:57
41.76.149.212 attackspam
2019-07-09T15:05:02.207549abusebot-4.cloudsearch.cf sshd\[25278\]: Invalid user oracle from 41.76.149.212 port 50398
2019-07-10 05:29:51
5.70.2.80 attack
Unauthorised access (Jul  9) SRC=5.70.2.80 LEN=44 TTL=56 ID=65126 TCP DPT=8080 WINDOW=36055 SYN 
Unauthorised access (Jul  8) SRC=5.70.2.80 LEN=44 TTL=56 ID=37902 TCP DPT=8080 WINDOW=36055 SYN
2019-07-10 05:33:42
80.82.65.74 attack
proto=tcp  .  spt=52026  .  dpt=3389  .  src=80.82.65.74  .  dst=xx.xx.4.1  .     (listed on CINS badguys  Jul 09)     (543)
2019-07-10 05:07:05
115.236.236.183 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-10 04:54:58
188.166.1.123 attackbotsspam
Jul  9 23:49:28 srv-4 sshd\[25040\]: Invalid user holland from 188.166.1.123
Jul  9 23:49:28 srv-4 sshd\[25040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.1.123
Jul  9 23:49:30 srv-4 sshd\[25040\]: Failed password for invalid user holland from 188.166.1.123 port 47948 ssh2
...
2019-07-10 05:34:35
106.111.101.98 attack
Jul  9 15:27:43 fr01 sshd[30689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.111.101.98  user=root
Jul  9 15:27:45 fr01 sshd[30689]: Failed password for root from 106.111.101.98 port 18206 ssh2
Jul  9 15:27:48 fr01 sshd[30689]: Failed password for root from 106.111.101.98 port 18206 ssh2
Jul  9 15:27:43 fr01 sshd[30689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.111.101.98  user=root
Jul  9 15:27:45 fr01 sshd[30689]: Failed password for root from 106.111.101.98 port 18206 ssh2
Jul  9 15:27:48 fr01 sshd[30689]: Failed password for root from 106.111.101.98 port 18206 ssh2
Jul  9 15:27:43 fr01 sshd[30689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.111.101.98  user=root
Jul  9 15:27:45 fr01 sshd[30689]: Failed password for root from 106.111.101.98 port 18206 ssh2
Jul  9 15:27:48 fr01 sshd[30689]: Failed password for root from 106.111.101.98 port 18206 ssh2
Jul  9 15:
2019-07-10 05:04:25
170.0.126.252 attackspam
Trying to deliver email spam, but blocked by RBL
2019-07-10 05:30:08
212.92.112.141 attackspambots
RDP Bruteforce
2019-07-10 05:11:07
90.184.153.35 attackbotsspam
Honeypot attack, port: 23, PTR: 0206702031.0.fullrate.ninja.
2019-07-10 05:04:48
175.150.166.207 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-10 04:57:31
94.23.145.156 attack
[munged]::443 94.23.145.156 - - [09/Jul/2019:15:26:22 +0200] "POST /[munged]: HTTP/1.1" 200 2436 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-10 05:24:35
183.129.160.229 attackbots
firewall-block, port(s): 51684/tcp
2019-07-10 05:16:09

Recently Reported IPs

49.240.92.243 231.137.151.12 216.30.250.101 222.234.19.52
224.48.4.45 198.182.79.190 255.167.115.18 251.167.222.62
44.240.144.216 222.79.227.124 86.56.137.194 38.112.104.124
226.141.187.121 62.22.214.50 66.155.130.38 129.218.100.197
60.9.161.207 148.239.107.37 88.62.118.76 74.200.57.233