Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Utrecht

Region: Provincie Utrecht

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: BIT BV

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.136.23.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39548
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.136.23.8.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat May 11 00:36:21 +08 2019
;; MSG SIZE  rcvd: 116

Host info
8.23.136.213.in-addr.arpa domain name pointer 213-136-23-8.weas.bit.nl.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
8.23.136.213.in-addr.arpa	name = 213-136-23-8.weas.bit.nl.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
58.248.142.138 attackspam
 TCP (SYN) 58.248.142.138:50337 -> port 8080, len 40
2020-08-13 03:29:30
193.239.147.136 attackbotsspam
 TCP (SYN) 193.239.147.136:53791 -> port 8080, len 44
2020-08-13 03:37:25
61.243.128.141 attack
Unauthorised access (Aug 12) SRC=61.243.128.141 LEN=40 TTL=46 ID=34163 TCP DPT=8080 WINDOW=22306 SYN
2020-08-13 03:28:16
14.233.173.89 attack
 TCP (SYN) 14.233.173.89:57095 -> port 445, len 52
2020-08-13 03:11:22
78.108.177.52 attack
Port scan - 7 hits (greater than 5)
2020-08-13 03:27:24
45.145.185.41 attack
 TCP (SYN) 45.145.185.41:47814 -> port 8080, len 40
2020-08-13 03:07:15
95.135.143.74 attackspambots
 TCP (SYN) 95.135.143.74:51975 -> port 445, len 52
2020-08-13 03:24:56
59.127.50.240 attack
 TCP (SYN) 59.127.50.240:32536 -> port 23, len 40
2020-08-13 03:29:10
177.10.216.34 attack
 TCP (SYN) 177.10.216.34:30494 -> port 8080, len 40
2020-08-13 03:17:50
91.241.163.45 attack
 TCP (SYN) 91.241.163.45:63818 -> port 445, len 52
2020-08-13 03:01:31
83.102.172.104 attackbots
 TCP (SYN) 83.102.172.104:48984 -> port 1433, len 40
2020-08-13 03:26:43
45.141.84.57 attackspam
 TCP (SYN) 45.141.84.57:3389 -> port 3389, len 44
2020-08-13 03:31:27
51.68.212.173 attack
 TCP (SYN) 51.68.212.173:53804 -> port 22, len 60
2020-08-13 03:06:03
123.25.218.255 attackspam
 TCP (SYN) 123.25.218.255:40689 -> port 81, len 44
2020-08-13 03:20:18
138.186.156.238 attack
 TCP (SYN) 138.186.156.238:53439 -> port 445, len 52
2020-08-13 03:19:44

Recently Reported IPs

125.118.244.47 18.210.230.122 110.60.162.34 182.248.214.15
182.122.165.127 38.47.47.59 179.189.87.211 185.251.181.235
94.73.194.10 188.234.231.4 27.210.240.183 113.185.11.167
171.5.74.127 110.213.123.246 59.61.131.111 174.138.106.36
197.174.120.70 134.175.223.86 220.199.127.102 116.250.65.4