Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Lithuania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.47.107.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.47.107.224.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 05:56:22 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 224.107.47.212.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 224.107.47.212.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
150.109.182.197 attackbots
[Thu Jun 11 12:55:45 2020] - DDoS Attack From IP: 150.109.182.197 Port: 38570
2020-07-08 23:25:57
175.176.90.134 attackspambots
1594210725 - 07/08/2020 14:18:45 Host: 175.176.90.134/175.176.90.134 Port: 445 TCP Blocked
2020-07-08 23:54:31
45.64.179.193 attackbots
Unauthorized connection attempt from IP address 45.64.179.193 on Port 445(SMB)
2020-07-08 23:39:08
116.85.44.148 attackbotsspam
Repeated brute force against a port
2020-07-08 23:26:42
209.169.153.33 attack
Jul  8 17:08:47 srv-ubuntu-dev3 sshd[129059]: Invalid user yoko from 209.169.153.33
Jul  8 17:08:47 srv-ubuntu-dev3 sshd[129059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.169.153.33
Jul  8 17:08:47 srv-ubuntu-dev3 sshd[129059]: Invalid user yoko from 209.169.153.33
Jul  8 17:08:49 srv-ubuntu-dev3 sshd[129059]: Failed password for invalid user yoko from 209.169.153.33 port 47394 ssh2
Jul  8 17:12:10 srv-ubuntu-dev3 sshd[129542]: Invalid user tammy from 209.169.153.33
Jul  8 17:12:10 srv-ubuntu-dev3 sshd[129542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.169.153.33
Jul  8 17:12:10 srv-ubuntu-dev3 sshd[129542]: Invalid user tammy from 209.169.153.33
Jul  8 17:12:13 srv-ubuntu-dev3 sshd[129542]: Failed password for invalid user tammy from 209.169.153.33 port 46327 ssh2
Jul  8 17:15:33 srv-ubuntu-dev3 sshd[130135]: Invalid user www from 209.169.153.33
...
2020-07-08 23:37:19
211.57.201.139 attackspambots
Lines containing failures of 211.57.201.139
Jul  7 21:26:18 shared04 sshd[7478]: Connection closed by 211.57.201.139 port 51528 [preauth]
Jul  7 21:28:11 shared04 sshd[8046]: Connection closed by 211.57.201.139 port 36116 [preauth]
Jul  7 21:40:16 shared04 sshd[11999]: Connection closed by 211.57.201.139 port 35466 [preauth]
Jul  7 21:44:47 shared04 sshd[13451]: Connection closed by 211.57.201.139 port 49908 [preauth]
Jul  7 21:44:53 shared04 sshd[13557]: Connection closed by 211.57.201.139 port 51942 [preauth]
Jul  7 22:10:03 shared04 sshd[22948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.57.201.139  user=r.r
Jul  7 22:10:05 shared04 sshd[22948]: Failed password for r.r from 211.57.201.139 port 42031 ssh2
Jul  7 22:10:07 shared04 sshd[22948]: Failed password for r.r from 211.57.201.139 port 42031 ssh2
Jul  7 22:10:10 shared04 sshd[22948]: Failed password for r.r from 211.57.201.139 port 42031 ssh2
Jul  7 22:10:10 shared0........
------------------------------
2020-07-08 23:50:46
222.186.175.182 attackspambots
2020-07-08T18:38:08.133557afi-git.jinr.ru sshd[16684]: Failed password for root from 222.186.175.182 port 16378 ssh2
2020-07-08T18:38:11.515778afi-git.jinr.ru sshd[16684]: Failed password for root from 222.186.175.182 port 16378 ssh2
2020-07-08T18:38:14.641871afi-git.jinr.ru sshd[16684]: Failed password for root from 222.186.175.182 port 16378 ssh2
2020-07-08T18:38:14.641985afi-git.jinr.ru sshd[16684]: error: maximum authentication attempts exceeded for root from 222.186.175.182 port 16378 ssh2 [preauth]
2020-07-08T18:38:14.641999afi-git.jinr.ru sshd[16684]: Disconnecting: Too many authentication failures [preauth]
...
2020-07-08 23:42:32
192.241.225.20 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-07-08 23:22:23
27.254.206.238 attackbotsspam
Jul  8 17:04:52 lukav-desktop sshd\[22753\]: Invalid user leon from 27.254.206.238
Jul  8 17:04:52 lukav-desktop sshd\[22753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.206.238
Jul  8 17:04:54 lukav-desktop sshd\[22753\]: Failed password for invalid user leon from 27.254.206.238 port 56000 ssh2
Jul  8 17:09:00 lukav-desktop sshd\[21695\]: Invalid user debian from 27.254.206.238
Jul  8 17:09:00 lukav-desktop sshd\[21695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.206.238
2020-07-09 00:02:15
5.0.122.68 attack
Unauthorized connection attempt from IP address 5.0.122.68 on Port 445(SMB)
2020-07-08 23:46:26
106.12.16.2 attackspambots
bruteforce detected
2020-07-08 23:19:37
192.241.200.17 attackbots
[Fri Jun 12 01:14:44 2020] - DDoS Attack From IP: 192.241.200.17 Port: 34819
2020-07-08 23:23:43
106.54.112.31 attackbots
445/tcp
[2020-07-08]1pkt
2020-07-08 23:56:17
61.227.48.117 attackspam
Unauthorized connection attempt from IP address 61.227.48.117 on Port 445(SMB)
2020-07-09 00:03:04
172.105.54.65 attack
2087/tcp 5007/tcp 8181/tcp...
[2020-05-11/07-08]15pkt,15pt.(tcp)
2020-07-08 23:31:17

Recently Reported IPs

236.165.226.153 13.247.71.114 17.159.218.48 17.128.69.205
120.117.232.217 245.176.18.119 33.103.97.240 39.1.114.61
24.99.229.222 143.81.3.117 123.189.23.76 193.72.185.67
22.142.109.149 131.186.167.174 86.209.157.152 253.193.81.48
87.210.93.165 122.88.191.168 53.67.59.31 156.27.82.12