Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.114.21.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26683
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.114.21.137.			IN	A

;; AUTHORITY SECTION:
.			510	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:14:14 CST 2022
;; MSG SIZE  rcvd: 107
Host info
137.21.114.212.in-addr.arpa domain name pointer 318516835.box.freepro.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.21.114.212.in-addr.arpa	name = 318516835.box.freepro.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.143.222.127 attackspambots
Apr 13 10:38:30 relay postfix/smtpd\[6741\]: warning: unknown\[45.143.222.127\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 13 10:38:56 relay postfix/smtpd\[7832\]: warning: unknown\[45.143.222.127\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 13 10:39:03 relay postfix/smtpd\[12559\]: warning: unknown\[45.143.222.127\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 13 10:39:14 relay postfix/smtpd\[12549\]: warning: unknown\[45.143.222.127\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 13 10:39:39 relay postfix/smtpd\[14445\]: warning: unknown\[45.143.222.127\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-14 01:20:23
113.87.144.130 attackbots
Apr 13 10:39:24 prod4 vsftpd\[17826\]: \[anonymous\] FAIL LOGIN: Client "113.87.144.130"
Apr 13 10:39:28 prod4 vsftpd\[17840\]: \[www\] FAIL LOGIN: Client "113.87.144.130"
Apr 13 10:39:33 prod4 vsftpd\[17844\]: \[www\] FAIL LOGIN: Client "113.87.144.130"
Apr 13 10:39:45 prod4 vsftpd\[17903\]: \[www\] FAIL LOGIN: Client "113.87.144.130"
Apr 13 10:39:47 prod4 vsftpd\[17906\]: \[www\] FAIL LOGIN: Client "113.87.144.130"
...
2020-04-14 01:13:19
94.191.58.198 attackspambots
6379/tcp 6379/tcp
[2020-04-10/13]2pkt
2020-04-14 00:40:27
164.132.183.203 attackbotsspam
3333/tcp 4567/tcp 5683/tcp...
[2020-02-12/04-13]67pkt,40pt.(tcp)
2020-04-14 01:02:13
201.149.67.171 attackspam
Honeypot attack, port: 445, PTR: 171.67.149.201.in-addr.arpa.
2020-04-14 01:20:00
222.186.175.217 attackspambots
Apr 13 23:44:13 webhost01 sshd[18469]: Failed password for root from 222.186.175.217 port 54664 ssh2
Apr 13 23:44:25 webhost01 sshd[18469]: error: maximum authentication attempts exceeded for root from 222.186.175.217 port 54664 ssh2 [preauth]
...
2020-04-14 00:57:27
200.61.208.215 attackspam
Apr 13 16:09:07 mail postfix/smtpd[61458]: warning: unknown[200.61.208.215]: SASL LOGIN authentication failed: generic failure
Apr 13 16:09:08 mail postfix/smtpd[61458]: warning: unknown[200.61.208.215]: SASL LOGIN authentication failed: generic failure
Apr 13 16:09:09 mail postfix/smtpd[61458]: warning: unknown[200.61.208.215]: SASL LOGIN authentication failed: generic failure
...
2020-04-14 01:16:43
122.51.49.32 attackspam
Apr 13 11:18:55 eventyay sshd[16177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.49.32
Apr 13 11:18:58 eventyay sshd[16177]: Failed password for invalid user stream from 122.51.49.32 port 32778 ssh2
Apr 13 11:21:47 eventyay sshd[16312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.49.32
...
2020-04-14 01:11:49
168.0.4.27 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-14 00:53:58
159.224.199.252 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-14 00:48:08
180.127.36.200 attackspambots
Unauthorized connection attempt detected from IP address 180.127.36.200 to port 5555 [T]
2020-04-14 00:50:43
78.46.161.81 attackspam
Reported bad bot @ 2020-04-13 17:40:01
2020-04-14 00:49:29
31.211.8.116 attack
445/tcp 445/tcp 445/tcp...
[2020-02-23/04-12]7pkt,1pt.(tcp)
2020-04-14 00:43:17
187.11.242.196 attackspambots
Apr 13 18:28:37 plex sshd[27544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.11.242.196  user=root
Apr 13 18:28:39 plex sshd[27544]: Failed password for root from 187.11.242.196 port 56232 ssh2
2020-04-14 00:42:00
36.67.63.9 attackbotsspam
Apr 13 17:24:17 server sshd[27648]: Failed password for invalid user CHasPfTzewQ from 36.67.63.9 port 59387 ssh2
Apr 13 17:28:45 server sshd[30781]: Failed password for invalid user 12345 from 36.67.63.9 port 59039 ssh2
Apr 13 17:33:04 server sshd[1380]: Failed password for invalid user ardi from 36.67.63.9 port 58691 ssh2
2020-04-14 00:37:36

Recently Reported IPs

212.108.149.23 212.113.172.10 212.112.108.122 212.115.42.251
212.115.115.17 212.114.27.0 212.117.94.179 212.119.40.138
212.119.40.201 212.119.40.206 212.119.40.179 212.119.40.37
212.119.40.114 212.119.41.177 212.119.40.74 212.119.41.210
212.119.40.77 212.119.40.46 212.119.41.66 212.119.41.79