Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.201.138.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31809
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.201.138.107.		IN	A

;; AUTHORITY SECTION:
.			399	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 01:32:22 CST 2022
;; MSG SIZE  rcvd: 108
Host info
107.138.201.212.in-addr.arpa domain name pointer kompetenzz2018.fh-bielefeld.de.
107.138.201.212.in-addr.arpa domain name pointer www.kompetenzz.de.
107.138.201.212.in-addr.arpa domain name pointer admin.kompetenzz.de.
107.138.201.212.in-addr.arpa domain name pointer frauen-technik-impulse.de.
107.138.201.212.in-addr.arpa domain name pointer zukunftsberuf-erzieher.de.
107.138.201.212.in-addr.arpa domain name pointer zukunftsberuf-pfleger.de.
107.138.201.212.in-addr.arpa domain name pointer zukunftsberuf-grundschullehrer.de.
107.138.201.212.in-addr.arpa domain name pointer kompetenzz.de.
107.138.201.212.in-addr.arpa domain name pointer girlday.de.
107.138.201.212.in-addr.arpa domain name pointer girl-day.de.
107.138.201.212.in-addr.arpa domain name pointer boyday.de.
107.138.201.212.in-addr.arpa domain name pointer boy-day.de.
107.138.201.212.in-addr.arpa domain name pointer boys-day.de.
107.138.201.212.in-addr.arpa domain name pointer girlsday.de.
107.138.201.212.in-addr.arpa domain name pointer girls-day.de.
Nslookup info:
b'107.138.201.212.in-addr.arpa	name = girlday.de.
107.138.201.212.in-addr.arpa	name = girls-day.de.
107.138.201.212.in-addr.arpa	name = kompetenzz2018.fh-bielefeld.de.
107.138.201.212.in-addr.arpa	name = girl-day.de.
107.138.201.212.in-addr.arpa	name = zukunftsberuf-pfleger.de.
107.138.201.212.in-addr.arpa	name = kompetenzz.de.
107.138.201.212.in-addr.arpa	name = www.kompetenzz.de.
107.138.201.212.in-addr.arpa	name = demografiewerkstatt-kommunen.de.
107.138.201.212.in-addr.arpa	name = boyday.de.
107.138.201.212.in-addr.arpa	name = admin.kompetenzz.de.
107.138.201.212.in-addr.arpa	name = boys-day.de.
107.138.201.212.in-addr.arpa	name = zukunftsberuf-grundschullehrer.de.
107.138.201.212.in-addr.arpa	name = frauen-technik-impulse.de.
107.138.201.212.in-addr.arpa	name = boy-day.de.
107.138.201.212.in-addr.arpa	name = zukunftsberuf-erzieher.de.
107.138.201.212.in-addr.arpa	name = girlsday.de.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
157.7.135.176 attackspambots
Nov 16 22:39:07 microserver sshd[47446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.7.135.176  user=root
Nov 16 22:39:09 microserver sshd[47446]: Failed password for root from 157.7.135.176 port 51346 ssh2
Nov 16 22:44:37 microserver sshd[48106]: Invalid user dialysis from 157.7.135.176 port 42018
Nov 16 22:44:37 microserver sshd[48106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.7.135.176
Nov 16 22:44:39 microserver sshd[48106]: Failed password for invalid user dialysis from 157.7.135.176 port 42018 ssh2
Nov 16 22:56:06 microserver sshd[49847]: Invalid user gardina from 157.7.135.176 port 42259
Nov 16 22:56:06 microserver sshd[49847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.7.135.176
Nov 16 22:56:08 microserver sshd[49847]: Failed password for invalid user gardina from 157.7.135.176 port 42259 ssh2
Nov 16 23:00:09 microserver sshd[50325]: Invalid user guest fro
2019-11-17 05:16:10
51.68.11.211 attack
Automatic report - Banned IP Access
2019-11-17 05:21:30
122.169.98.109 attackspam
Unauthorized connection attempt from IP address 122.169.98.109 on Port 445(SMB)
2019-11-17 05:08:30
51.219.146.250 attackspambots
Unauthorized connection attempt from IP address 51.219.146.250 on Port 445(SMB)
2019-11-17 05:20:24
118.24.40.136 attack
Invalid user info from 118.24.40.136 port 47454
2019-11-17 04:53:06
223.19.157.15 attack
Unauthorized connection attempt from IP address 223.19.157.15 on Port 445(SMB)
2019-11-17 04:57:37
45.143.220.16 attackbots
\[2019-11-16 16:05:12\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-16T16:05:12.335-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="53146262229920",SessionID="0x7fdf2c1d9a78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.16/55427",ACLName="no_extension_match"
\[2019-11-16 16:08:24\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-16T16:08:24.741-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="53246262229920",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.16/61831",ACLName="no_extension_match"
\[2019-11-16 16:11:31\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-16T16:11:31.330-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="53346262229920",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.16/53867",ACLName="no_extens
2019-11-17 05:14:29
187.157.157.210 attackspambots
Unauthorized connection attempt from IP address 187.157.157.210 on Port 445(SMB)
2019-11-17 04:48:29
178.174.180.84 attackbots
178.174.180.84 was recorded 9 times by 1 hosts attempting to connect to the following ports: 23. Incident counter (4h, 24h, all-time): 9, 75, 106
2019-11-17 05:25:19
103.77.21.39 attack
Unauthorized connection attempt from IP address 103.77.21.39 on Port 445(SMB)
2019-11-17 05:17:55
116.228.53.227 attackbots
Nov 16 15:42:20 pornomens sshd\[6453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.228.53.227  user=root
Nov 16 15:42:22 pornomens sshd\[6453\]: Failed password for root from 116.228.53.227 port 40250 ssh2
Nov 16 15:45:51 pornomens sshd\[6496\]: Invalid user yecenia from 116.228.53.227 port 47546
Nov 16 15:45:51 pornomens sshd\[6496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.228.53.227
...
2019-11-17 05:08:43
80.82.77.227 attackbotsspam
11/16/2019-15:10:33.791477 80.82.77.227 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 82
2019-11-17 04:56:58
128.134.30.40 attackbots
Nov 16 15:28:44 l02a sshd[4656]: Invalid user vq from 128.134.30.40
Nov 16 15:28:44 l02a sshd[4656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.134.30.40 
Nov 16 15:28:44 l02a sshd[4656]: Invalid user vq from 128.134.30.40
Nov 16 15:28:45 l02a sshd[4656]: Failed password for invalid user vq from 128.134.30.40 port 25023 ssh2
2019-11-17 04:52:35
165.227.84.119 attackbotsspam
Nov 16 18:26:43 lnxweb62 sshd[19826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.84.119
2019-11-17 05:02:00
94.249.71.137 attack
Unauthorized connection attempt from IP address 94.249.71.137 on Port 445(SMB)
2019-11-17 05:11:43

Recently Reported IPs

212.205.0.211 212.205.0.212 212.205.77.210 212.202.64.154
212.205.24.139 212.205.77.225 212.21.169.2 212.205.46.5
212.216.232.10 212.21.144.2 212.21.150.152 212.219.139.54
212.21.66.25 212.21.239.234 212.217.29.163 212.217.30.21
212.219.15.12 212.22.251.204 212.219.56.184 212.22.251.85