Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Sprint

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.214.20.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23981
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;204.214.20.137.			IN	A

;; AUTHORITY SECTION:
.			242	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061702 1800 900 604800 86400

;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 18 08:24:19 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 137.20.214.204.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 137.20.214.204.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
83.213.175.117 attack
Caught in portsentry honeypot
2020-01-20 13:14:18
112.2.52.100 attackspam
Brute force attempt
2020-01-20 13:27:40
104.168.142.229 attack
2020-01-19T23:42:11.3404711495-001 sshd[29566]: Invalid user lena from 104.168.142.229 port 55354
2020-01-19T23:42:11.3496611495-001 sshd[29566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=hwsrv-656802.hostwindsdns.com
2020-01-19T23:42:11.3404711495-001 sshd[29566]: Invalid user lena from 104.168.142.229 port 55354
2020-01-19T23:42:13.0808461495-001 sshd[29566]: Failed password for invalid user lena from 104.168.142.229 port 55354 ssh2
2020-01-19T23:44:41.3200111495-001 sshd[29648]: Invalid user admin from 104.168.142.229 port 50442
2020-01-19T23:44:41.3232021495-001 sshd[29648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=hwsrv-656802.hostwindsdns.com
2020-01-19T23:44:41.3200111495-001 sshd[29648]: Invalid user admin from 104.168.142.229 port 50442
2020-01-19T23:44:42.9783291495-001 sshd[29648]: Failed password for invalid user admin from 104.168.142.229 port 50442 ssh2
2020-01-19T23:47:09.1872401
...
2020-01-20 13:09:22
213.4.33.11 attackbotsspam
Jan 20 05:59:19 herz-der-gamer sshd[16250]: Invalid user operations from 213.4.33.11 port 50732
Jan 20 05:59:19 herz-der-gamer sshd[16250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.4.33.11
Jan 20 05:59:19 herz-der-gamer sshd[16250]: Invalid user operations from 213.4.33.11 port 50732
Jan 20 05:59:21 herz-der-gamer sshd[16250]: Failed password for invalid user operations from 213.4.33.11 port 50732 ssh2
...
2020-01-20 13:26:08
179.232.1.254 attackspam
Jan 20 06:15:56 sd-53420 sshd\[14283\]: Invalid user sheng from 179.232.1.254
Jan 20 06:15:56 sd-53420 sshd\[14283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.254
Jan 20 06:15:58 sd-53420 sshd\[14283\]: Failed password for invalid user sheng from 179.232.1.254 port 33425 ssh2
Jan 20 06:18:46 sd-53420 sshd\[14654\]: Invalid user tomcat from 179.232.1.254
Jan 20 06:18:46 sd-53420 sshd\[14654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.254
...
2020-01-20 13:24:36
176.113.70.60 attack
176.113.70.60 was recorded 12 times by 3 hosts attempting to connect to the following ports: 1900. Incident counter (4h, 24h, all-time): 12, 48, 587
2020-01-20 13:20:56
123.56.146.238 attackspambots
Unauthorized connection attempt detected from IP address 123.56.146.238 to port 23 [J]
2020-01-20 09:12:58
222.252.105.42 attack
20/1/19@23:59:50: FAIL: Alarm-Network address from=222.252.105.42
...
2020-01-20 13:07:31
113.177.74.177 attackbots
20/1/19@23:59:41: FAIL: Alarm-Network address from=113.177.74.177
...
2020-01-20 13:14:52
153.122.51.195 attack
Unauthorized connection attempt detected from IP address 153.122.51.195 to port 2220 [J]
2020-01-20 13:16:39
222.186.175.220 attack
Jan 19 19:01:56 wbs sshd\[23122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
Jan 19 19:01:58 wbs sshd\[23122\]: Failed password for root from 222.186.175.220 port 58312 ssh2
Jan 19 19:02:01 wbs sshd\[23122\]: Failed password for root from 222.186.175.220 port 58312 ssh2
Jan 19 19:02:04 wbs sshd\[23122\]: Failed password for root from 222.186.175.220 port 58312 ssh2
Jan 19 19:02:15 wbs sshd\[23156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
2020-01-20 13:06:29
222.186.190.92 attackbotsspam
Jan 20 06:06:42 lnxweb61 sshd[302]: Failed password for root from 222.186.190.92 port 44504 ssh2
Jan 20 06:06:46 lnxweb61 sshd[302]: Failed password for root from 222.186.190.92 port 44504 ssh2
Jan 20 06:06:49 lnxweb61 sshd[302]: Failed password for root from 222.186.190.92 port 44504 ssh2
Jan 20 06:06:53 lnxweb61 sshd[302]: Failed password for root from 222.186.190.92 port 44504 ssh2
2020-01-20 13:08:29
132.248.52.241 attackspambots
Jan 19 23:56:35 ny01 sshd[13108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.248.52.241
Jan 19 23:56:36 ny01 sshd[13108]: Failed password for invalid user s1 from 132.248.52.241 port 36856 ssh2
Jan 19 23:59:31 ny01 sshd[13625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.248.52.241
2020-01-20 13:21:45
158.69.220.178 attackspam
Jan 20 06:21:21 dedicated sshd[28379]: Invalid user banca from 158.69.220.178 port 35776
2020-01-20 13:27:27
120.70.101.46 attackbotsspam
Jan 19 23:54:08 onepro3 sshd[16003]: Failed password for root from 120.70.101.46 port 42029 ssh2
Jan 20 00:00:13 onepro3 sshd[16021]: Failed password for invalid user testuser from 120.70.101.46 port 36370 ssh2
Jan 20 00:04:17 onepro3 sshd[16070]: Failed password for invalid user tom from 120.70.101.46 port 53903 ssh2
2020-01-20 13:25:18

Recently Reported IPs

94.200.94.29 49.228.197.85 84.158.231.228 219.52.191.249
80.237.28.29 66.38.95.122 140.213.56.57 122.181.16.134
205.221.51.26 97.46.152.50 192.30.194.75 184.191.22.62
218.236.36.92 90.166.112.24 165.55.201.119 179.211.88.251
13.213.223.82 74.168.23.220 132.198.55.172 192.35.168.252