Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.105.14.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60365
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;212.105.14.207.			IN	A

;; AUTHORITY SECTION:
.			188	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070902 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 10 08:51:20 CST 2020
;; MSG SIZE  rcvd: 118
Host info
207.14.105.212.in-addr.arpa domain name pointer md4690ecf.utfors.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
207.14.105.212.in-addr.arpa	name = md4690ecf.utfors.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
1.20.156.151 attack
Unauthorized connection attempt detected from IP address 1.20.156.151 to port 445
2019-12-20 17:31:44
14.186.135.151 attackbotsspam
Unauthorized connection attempt from IP address 14.186.135.151 on Port 445(SMB)
2019-12-20 17:27:31
190.202.109.244 attack
Dec 20 03:30:27 linuxvps sshd\[13226\]: Invalid user fooi from 190.202.109.244
Dec 20 03:30:27 linuxvps sshd\[13226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.202.109.244
Dec 20 03:30:30 linuxvps sshd\[13226\]: Failed password for invalid user fooi from 190.202.109.244 port 36760 ssh2
Dec 20 03:36:47 linuxvps sshd\[17381\]: Invalid user yy from 190.202.109.244
Dec 20 03:36:47 linuxvps sshd\[17381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.202.109.244
2019-12-20 16:52:27
190.236.171.177 attack
firewall-block, port(s): 23/tcp
2019-12-20 17:19:54
183.240.157.3 attackbotsspam
Dec 20 09:07:52 pi sshd\[9846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.240.157.3
Dec 20 09:07:53 pi sshd\[9846\]: Failed password for invalid user achille from 183.240.157.3 port 37402 ssh2
Dec 20 09:14:23 pi sshd\[10260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.240.157.3  user=root
Dec 20 09:14:24 pi sshd\[10260\]: Failed password for root from 183.240.157.3 port 58394 ssh2
Dec 20 09:21:03 pi sshd\[10626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.240.157.3  user=backup
...
2019-12-20 17:24:09
159.203.82.104 attackbotsspam
Dec 20 11:42:03 hosting sshd[22660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.82.104  user=root
Dec 20 11:42:05 hosting sshd[22660]: Failed password for root from 159.203.82.104 port 46608 ssh2
...
2019-12-20 16:53:53
36.65.117.202 attack
Host Scan
2019-12-20 17:22:55
202.131.227.60 attackbots
Dec 20 09:20:24 thevastnessof sshd[20230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.227.60
...
2019-12-20 17:20:53
178.62.64.107 attackspambots
Dec 20 16:14:22 itv-usvr-01 sshd[3791]: Invalid user vogelmann from 178.62.64.107
Dec 20 16:14:22 itv-usvr-01 sshd[3791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.64.107
Dec 20 16:14:22 itv-usvr-01 sshd[3791]: Invalid user vogelmann from 178.62.64.107
Dec 20 16:14:25 itv-usvr-01 sshd[3791]: Failed password for invalid user vogelmann from 178.62.64.107 port 48562 ssh2
Dec 20 16:19:39 itv-usvr-01 sshd[3963]: Invalid user pcap from 178.62.64.107
2019-12-20 17:31:21
106.124.141.108 attack
Dec 19 22:50:08 home sshd[9190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.141.108  user=root
Dec 19 22:50:10 home sshd[9190]: Failed password for root from 106.124.141.108 port 39771 ssh2
Dec 19 22:59:30 home sshd[9223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.141.108  user=root
Dec 19 22:59:33 home sshd[9223]: Failed password for root from 106.124.141.108 port 41303 ssh2
Dec 19 23:06:46 home sshd[9268]: Invalid user victoria from 106.124.141.108 port 37668
Dec 19 23:06:46 home sshd[9268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.141.108
Dec 19 23:06:46 home sshd[9268]: Invalid user victoria from 106.124.141.108 port 37668
Dec 19 23:06:48 home sshd[9268]: Failed password for invalid user victoria from 106.124.141.108 port 37668 ssh2
Dec 19 23:13:15 home sshd[9311]: Invalid user cylectro from 106.124.141.108 port 33975
Dec 19 23:13:15 home sshd[93
2019-12-20 17:18:59
5.152.111.129 attackspam
Host Scan
2019-12-20 16:55:08
160.153.245.134 attack
detected by Fail2Ban
2019-12-20 17:01:53
196.192.110.100 attack
Dec 20 04:02:14 ny01 sshd[845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.192.110.100
Dec 20 04:02:17 ny01 sshd[845]: Failed password for invalid user stigum from 196.192.110.100 port 60466 ssh2
Dec 20 04:09:05 ny01 sshd[1559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.192.110.100
2019-12-20 17:23:54
107.170.20.247 attackbotsspam
leo_www
2019-12-20 17:10:07
92.124.137.220 spamattack
Попытка взлома социальных сетей с данного (IP 92.124.137.220) адреса
2019-12-20 17:29:55

Recently Reported IPs

221.78.112.227 69.243.136.61 67.80.53.135 116.179.68.209
180.154.147.200 68.40.160.165 117.171.20.154 122.214.151.183
221.95.188.170 189.224.208.16 24.203.244.164 166.142.184.29
97.175.49.251 107.219.19.241 82.17.44.6 82.158.12.104
90.55.65.133 115.195.87.96 68.26.66.162 177.231.206.134