Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Norrköping

Region: Östergötland

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.214.140.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51545
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;212.214.140.243.		IN	A

;; AUTHORITY SECTION:
.			411	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030101 1800 900 604800 86400

;; Query time: 120 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 02 08:09:39 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 243.140.214.212.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 243.140.214.212.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
140.143.61.127 attackspam
May 13 14:28:33 h2646465 sshd[15177]: Invalid user jackpot from 140.143.61.127
May 13 14:28:33 h2646465 sshd[15177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.61.127
May 13 14:28:33 h2646465 sshd[15177]: Invalid user jackpot from 140.143.61.127
May 13 14:28:35 h2646465 sshd[15177]: Failed password for invalid user jackpot from 140.143.61.127 port 40756 ssh2
May 13 14:39:57 h2646465 sshd[16675]: Invalid user aaa from 140.143.61.127
May 13 14:39:57 h2646465 sshd[16675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.61.127
May 13 14:39:57 h2646465 sshd[16675]: Invalid user aaa from 140.143.61.127
May 13 14:40:00 h2646465 sshd[16675]: Failed password for invalid user aaa from 140.143.61.127 port 33716 ssh2
May 13 14:44:56 h2646465 sshd[17331]: Invalid user kay from 140.143.61.127
...
2020-05-13 20:57:03
87.251.74.200 attackbots
May 13 14:39:33 debian-2gb-nbg1-2 kernel: \[11632431.228194\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.200 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=15456 PROTO=TCP SPT=42981 DPT=14709 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-13 20:41:31
147.135.209.15 attackspambots
1589371730 - 05/13/2020 14:08:50 Host: 147.135.209.15/147.135.209.15 Port: 22 TCP Blocked
2020-05-13 20:12:24
27.78.14.83 attackbotsspam
SSH brute-force: detected 13 distinct usernames within a 24-hour window.
2020-05-13 20:20:43
190.45.181.188 attackspambots
May 13 14:39:22 vps647732 sshd[29096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.45.181.188
May 13 14:39:24 vps647732 sshd[29096]: Failed password for invalid user ccserver from 190.45.181.188 port 50866 ssh2
...
2020-05-13 20:51:55
190.15.209.249 attackbots
Unauthorized connection attempt detected from IP address 190.15.209.249 to port 23
2020-05-13 20:14:13
183.36.125.220 attackbots
k+ssh-bruteforce
2020-05-13 20:43:35
36.71.238.102 attackspam
May 13 05:49:02 debian64 sshd[32286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.71.238.102 
May 13 05:49:04 debian64 sshd[32286]: Failed password for invalid user user from 36.71.238.102 port 18244 ssh2
...
2020-05-13 20:28:00
113.163.15.197 attackspambots
2020-05-13T05:48:49.8891241240 sshd\[4835\]: Invalid user guest from 113.163.15.197 port 56693
2020-05-13T05:48:50.1981531240 sshd\[4835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.163.15.197
2020-05-13T05:48:52.3522871240 sshd\[4835\]: Failed password for invalid user guest from 113.163.15.197 port 56693 ssh2
...
2020-05-13 20:39:48
47.247.91.151 attackbots
1589373564 - 05/13/2020 14:39:24 Host: 47.247.91.151/47.247.91.151 Port: 445 TCP Blocked
2020-05-13 20:50:46
37.187.195.209 attackspam
May 13 09:29:45 inter-technics sshd[28630]: Invalid user mine from 37.187.195.209 port 44821
May 13 09:29:45 inter-technics sshd[28630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.195.209
May 13 09:29:45 inter-technics sshd[28630]: Invalid user mine from 37.187.195.209 port 44821
May 13 09:29:46 inter-technics sshd[28630]: Failed password for invalid user mine from 37.187.195.209 port 44821 ssh2
May 13 09:33:14 inter-technics sshd[28862]: Invalid user guest from 37.187.195.209 port 47390
...
2020-05-13 20:15:56
123.207.7.130 attack
prod11
...
2020-05-13 21:02:17
89.248.168.217 attackbots
May 13 14:39:21 debian-2gb-nbg1-2 kernel: \[11632419.653641\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.168.217 DST=195.201.40.59 LEN=29 TOS=0x00 PREC=0x00 TTL=247 ID=54321 PROTO=UDP SPT=49837 DPT=139 LEN=9
2020-05-13 20:56:18
193.118.53.198 attack
Port scan(s) (1) denied
2020-05-13 20:17:11
178.32.163.201 attackbots
May 13 14:35:45 electroncash sshd[61453]: Invalid user ni from 178.32.163.201 port 56790
May 13 14:35:45 electroncash sshd[61453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.163.201 
May 13 14:35:45 electroncash sshd[61453]: Invalid user ni from 178.32.163.201 port 56790
May 13 14:35:47 electroncash sshd[61453]: Failed password for invalid user ni from 178.32.163.201 port 56790 ssh2
May 13 14:39:21 electroncash sshd[62431]: Invalid user deploy from 178.32.163.201 port 34650
...
2020-05-13 20:55:28

Recently Reported IPs

192.241.224.153 113.246.18.45 187.109.135.111 192.241.223.249
16.168.29.157 108.253.72.53 220.169.5.103 192.241.222.149
31.151.154.2 62.58.13.238 145.64.202.123 192.241.222.137
203.118.187.4 42.227.225.4 193.250.160.62 128.134.210.210
122.159.241.81 192.241.222.82 37.117.139.140 93.155.61.196