Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hochstadt an der Aisch

Region: Bavaria

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.204.127.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49536
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;212.204.127.107.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091601 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 17 02:20:55 CST 2019
;; MSG SIZE  rcvd: 119
Host info
107.127.204.212.in-addr.arpa domain name pointer host-127-204-212-107.customer.m-online.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
107.127.204.212.in-addr.arpa	name = host-127-204-212-107.customer.m-online.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.39.70.5 attackbotsspam
sshd jail - ssh hack attempt
2020-04-07 04:59:36
202.70.136.161 attack
Unauthorized connection attempt from IP address 202.70.136.161 on Port 445(SMB)
2020-04-07 04:53:33
104.244.74.143 attackspam
Port 161 scan denied
2020-04-07 05:03:12
45.166.30.92 attackspam
Unauthorized connection attempt from IP address 45.166.30.92 on Port 445(SMB)
2020-04-07 05:14:39
14.168.98.174 attackbotsspam
Unauthorized connection attempt from IP address 14.168.98.174 on Port 445(SMB)
2020-04-07 04:50:45
137.74.195.204 attackspam
Apr  6 07:02:08 main sshd[30741]: Failed password for invalid user phion from 137.74.195.204 port 48290 ssh2
Apr  6 07:03:57 main sshd[30833]: Failed password for invalid user daniel from 137.74.195.204 port 40058 ssh2
2020-04-07 04:48:59
43.243.37.227 attackspambots
Apr  6 15:04:39 mail sshd\[65033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.37.227  user=root
...
2020-04-07 04:47:24
222.186.180.6 attackbots
Apr  6 21:34:07 combo sshd[10600]: Failed password for root from 222.186.180.6 port 54974 ssh2
Apr  6 21:34:11 combo sshd[10600]: Failed password for root from 222.186.180.6 port 54974 ssh2
Apr  6 21:34:14 combo sshd[10600]: Failed password for root from 222.186.180.6 port 54974 ssh2
...
2020-04-07 04:40:13
122.228.208.113 attackspam
Port scan on 3 port(s): 6666 8088 9050
2020-04-07 05:05:48
146.185.25.176 attackbots
Port 8080 (HTTP proxy) access denied
2020-04-07 04:50:57
123.28.137.173 attackspambots
Unauthorized connection attempt from IP address 123.28.137.173 on Port 445(SMB)
2020-04-07 04:37:53
194.204.194.11 attack
$f2bV_matches
2020-04-07 05:12:29
222.186.175.216 attackbots
Apr  6 23:14:14 host01 sshd[12723]: Failed password for root from 222.186.175.216 port 22588 ssh2
Apr  6 23:14:17 host01 sshd[12723]: Failed password for root from 222.186.175.216 port 22588 ssh2
Apr  6 23:14:20 host01 sshd[12723]: Failed password for root from 222.186.175.216 port 22588 ssh2
Apr  6 23:14:24 host01 sshd[12723]: Failed password for root from 222.186.175.216 port 22588 ssh2
...
2020-04-07 05:16:38
221.6.35.90 attackspam
Apr  6 18:15:07 game-panel sshd[9779]: Failed password for root from 221.6.35.90 port 63122 ssh2
Apr  6 18:17:59 game-panel sshd[9909]: Failed password for root from 221.6.35.90 port 16745 ssh2
2020-04-07 04:41:26
128.199.79.158 attackbotsspam
leo_www
2020-04-07 04:51:51

Recently Reported IPs

99.205.90.143 112.124.169.210 202.71.59.35 109.153.161.88
108.3.202.220 59.38.13.54 223.202.93.185 178.55.173.94
136.174.136.145 187.102.65.80 104.238.132.40 216.120.96.250
193.197.146.204 172.242.78.76 74.197.241.52 18.130.185.89
35.152.4.43 95.216.241.62 39.122.251.188 59.62.98.2