Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
212.164.208.169 attack
Unauthorized connection attempt from IP address 212.164.208.169 on Port 445(SMB)
2020-07-15 15:33:29
212.164.208.169 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-07 14:08:59
212.164.208.169 attack
445/tcp
[2019-07-03]1pkt
2019-07-03 19:36:24
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.164.208.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53294
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.164.208.41.			IN	A

;; AUTHORITY SECTION:
.			415	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 16:43:00 CST 2022
;; MSG SIZE  rcvd: 107
Host info
41.208.164.212.in-addr.arpa domain name pointer b-internet.212.164.208.41.nsk.rt.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.208.164.212.in-addr.arpa	name = b-internet.212.164.208.41.nsk.rt.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.138.134.71 attackspambots
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 04:35:50
121.136.37.239 attackbots
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 04:37:06
106.52.106.61 attack
Dec 25 16:49:54 MK-Soft-VM7 sshd[9394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.106.61 
Dec 25 16:49:56 MK-Soft-VM7 sshd[9394]: Failed password for invalid user jpmorgan from 106.52.106.61 port 53638 ssh2
...
2019-12-26 04:43:12
119.118.30.155 attackbots
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 04:49:29
121.152.244.49 attackspam
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 04:30:08
91.134.240.73 attackbots
Invalid user witort from 91.134.240.73 port 57028
2019-12-26 04:24:26
113.167.113.211 attackbots
1577285358 - 12/25/2019 15:49:18 Host: 113.167.113.211/113.167.113.211 Port: 445 TCP Blocked
2019-12-26 04:30:31
116.58.186.101 attackspam
Invalid user pi from 116.58.186.101 port 47726
2019-12-26 04:46:11
71.6.199.23 attackbotsspam
12/25/2019-15:31:41.238860 71.6.199.23 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2019-12-26 04:52:09
206.174.214.90 attackspambots
SSH invalid-user multiple login try
2019-12-26 04:23:34
94.228.180.63 attack
Dec 25 14:35:43 raspberrypi sshd\[14045\]: Invalid user wpyan from 94.228.180.63Dec 25 14:35:45 raspberrypi sshd\[14045\]: Failed password for invalid user wpyan from 94.228.180.63 port 39538 ssh2Dec 25 14:58:27 raspberrypi sshd\[15535\]: Invalid user bess from 94.228.180.63
...
2019-12-26 04:20:00
192.99.151.33 attackbotsspam
$f2bV_matches
2019-12-26 04:37:31
42.117.121.153 attackbots
Unauthorized connection attempt detected from IP address 42.117.121.153 to port 445
2019-12-26 04:22:37
61.244.222.145 attack
Unauthorized connection attempt detected from IP address 61.244.222.145 to port 445
2019-12-26 04:31:29
94.153.175.14 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-12-26 04:28:15

Recently Reported IPs

212.164.162.43 212.164.205.218 212.164.38.25 212.164.39.224
212.164.39.241 212.164.39.38 212.165.108.173 212.164.65.189
212.166.70.40 212.170.218.35 212.170.50.170 212.170.168.45
212.174.242.90 212.174.72.50 212.174.53.232 212.174.25.95
212.175.206.61 212.178.14.127 212.178.8.252 212.18.121.253