Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: Jan Philipp Waldecker trading as LUMASERV Systems

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.114.58.32
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20200
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;212.114.58.32.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041301 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Apr 14 07:34:09 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 32.58.114.212.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 32.58.114.212.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
196.196.216.142 attackspambots
fell into ViewStateTrap:paris
2019-12-24 22:32:14
49.232.152.3 attack
Invalid user guest from 49.232.152.3 port 38650
2019-12-24 22:23:26
85.93.52.99 attackspam
Invalid user bambang from 85.93.52.99 port 49780
2019-12-24 21:59:22
46.105.29.160 attackspam
Dec 24 12:31:13 s1 sshd\[23441\]: Invalid user hershey from 46.105.29.160 port 35894
Dec 24 12:31:13 s1 sshd\[23441\]: Failed password for invalid user hershey from 46.105.29.160 port 35894 ssh2
Dec 24 12:33:06 s1 sshd\[23522\]: User sshd from 46.105.29.160 not allowed because not listed in AllowUsers
Dec 24 12:33:06 s1 sshd\[23522\]: Failed password for invalid user sshd from 46.105.29.160 port 54684 ssh2
Dec 24 12:35:01 s1 sshd\[23586\]: Invalid user operator from 46.105.29.160 port 45122
Dec 24 12:35:01 s1 sshd\[23586\]: Failed password for invalid user operator from 46.105.29.160 port 45122 ssh2
...
2019-12-24 22:31:21
188.254.0.112 attackspam
Brute-force attempt banned
2019-12-24 22:32:35
46.0.203.166 attackspam
Dec 24 15:11:42 localhost sshd\[22587\]: Invalid user melodee from 46.0.203.166 port 40134
Dec 24 15:11:42 localhost sshd\[22587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.0.203.166
Dec 24 15:11:44 localhost sshd\[22587\]: Failed password for invalid user melodee from 46.0.203.166 port 40134 ssh2
2019-12-24 22:22:09
167.71.123.34 attackbotsspam
" "
2019-12-24 22:04:39
54.38.36.244 attackbots
Automatic report - Banned IP Access
2019-12-24 22:34:32
110.139.207.18 attackbotsspam
Invalid user peh from 110.139.207.18 port 34986
2019-12-24 22:06:17
118.69.174.108 attack
Automatic report - Banned IP Access
2019-12-24 22:28:19
121.164.224.52 attackspam
$f2bV_matches
2019-12-24 22:37:26
119.29.65.240 attack
SSH invalid-user multiple login attempts
2019-12-24 21:58:45
50.239.163.172 attackbotsspam
(sshd) Failed SSH login from 50.239.163.172 (US/United States/Georgia/Cumming/-/[AS7922 Comcast Cable Communications, LLC]): 1 in the last 3600 secs
2019-12-24 22:41:23
218.92.0.138 attack
2019-12-24T13:57:45.938822abusebot-2.cloudsearch.cf sshd[21775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
2019-12-24T13:57:47.368288abusebot-2.cloudsearch.cf sshd[21775]: Failed password for root from 218.92.0.138 port 47599 ssh2
2019-12-24T13:57:50.747012abusebot-2.cloudsearch.cf sshd[21775]: Failed password for root from 218.92.0.138 port 47599 ssh2
2019-12-24T13:57:45.938822abusebot-2.cloudsearch.cf sshd[21775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
2019-12-24T13:57:47.368288abusebot-2.cloudsearch.cf sshd[21775]: Failed password for root from 218.92.0.138 port 47599 ssh2
2019-12-24T13:57:50.747012abusebot-2.cloudsearch.cf sshd[21775]: Failed password for root from 218.92.0.138 port 47599 ssh2
2019-12-24T13:57:45.938822abusebot-2.cloudsearch.cf sshd[21775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rho
...
2019-12-24 22:08:03
180.250.214.25 attackspambots
Dec 24 12:53:57 l02a sshd[7034]: Invalid user test from 180.250.214.25
Dec 24 12:53:57 l02a sshd[7034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.214.25 
Dec 24 12:53:57 l02a sshd[7034]: Invalid user test from 180.250.214.25
Dec 24 12:53:58 l02a sshd[7034]: Failed password for invalid user test from 180.250.214.25 port 46572 ssh2
2019-12-24 22:14:11

Recently Reported IPs

103.91.143.244 190.232.106.76 35.243.211.249 190.64.71.38
183.166.190.6 77.243.31.91 191.100.30.204 159.65.186.239
122.14.209.213 5.173.249.71 211.206.124.57 190.113.142.197
180.250.46.99 185.166.212.212 156.204.20.18 109.186.233.169
80.15.73.201 217.149.163.114 142.11.236.32 54.39.144.23