Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Uzbekistan

Internet Service Provider: unknown

Hostname: unknown

Organization: Uzbektelekom Joint Stock Company

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
213.230.114.7 attack
Jun 27 14:22:18 smtp postfix/smtpd[31494]: NOQUEUE: reject: RCPT from unknown[213.230.114.7]: 554 5.7.1 Service unavailable; Client host [213.230.114.7] blocked using cbl.abuseat.org; Blocked - see http://www.abuseat.org/lookup.cgi?ip=213.230.114.7; from= to= proto=ESMTP helo=<[213.230.114.7]>
...
2020-06-27 20:41:31
213.230.114.60 attackspam
Nov  8 07:08:39 mxgate1 postfix/postscreen[2829]: CONNECT from [213.230.114.60]:12491 to [176.31.12.44]:25
Nov  8 07:08:39 mxgate1 postfix/dnsblog[2835]: addr 213.230.114.60 listed by domain cbl.abuseat.org as 127.0.0.2
Nov  8 07:08:39 mxgate1 postfix/dnsblog[2831]: addr 213.230.114.60 listed by domain zen.spamhaus.org as 127.0.0.11
Nov  8 07:08:39 mxgate1 postfix/dnsblog[2831]: addr 213.230.114.60 listed by domain zen.spamhaus.org as 127.0.0.4
Nov  8 07:08:39 mxgate1 postfix/dnsblog[2832]: addr 213.230.114.60 listed by domain b.barracudacentral.org as 127.0.0.2
Nov  8 07:08:39 mxgate1 postfix/postscreen[2829]: PREGREET 23 after 0.16 from [213.230.114.60]:12491: EHLO [213.230.114.60]

Nov  8 07:08:39 mxgate1 postfix/postscreen[2829]: DNSBL rank 4 for [213.230.114.60]:12491
Nov x@x
Nov  8 07:08:40 mxgate1 postfix/postscreen[2829]: HANGUP after 0.59 from [213.230.114.60]:12491 in tests after SMTP handshake
Nov  8 07:08:40 mxgate1 postfix/postscreen[2829]: DISCONNECT [213.........
-------------------------------
2019-11-08 19:36:01
213.230.114.145 attackbotsspam
2019-07-04 05:53:42 H=(145.64.uzpak.uz) [213.230.114.145]:25482 I=[10.100.18.23]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=213.230.114.145)
2019-07-04 05:53:42 unexpected disconnection while reading SMTP command from (145.64.uzpak.uz) [213.230.114.145]:25482 I=[10.100.18.23]:25 (error: Connection reset by peer)
2019-07-04 07:45:57 H=(145.64.uzpak.uz) [213.230.114.145]:52974 I=[10.100.18.23]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=213.230.114.145)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=213.230.114.145
2019-07-04 19:50:45
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.230.114.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61063
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.230.114.5.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060400 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 05 01:35:27 CST 2019
;; MSG SIZE  rcvd: 117

Host info
5.114.230.213.in-addr.arpa domain name pointer 5.64.uzpak.uz.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
5.114.230.213.in-addr.arpa	name = 5.64.uzpak.uz.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
24.61.167.172 spambotsattack
I keep getting messages and emails from this bot and it’s getting way out of hand
2021-01-08 00:52:39
185.30.177.176 spambots
using SSL application, could be a monero miner
2020-12-30 13:56:34
195.62.32.21 spamattack
PHISHING ATTACK
Meet Ultrazoom  : 
"Super Telephoto Zoom Monocular Telescope" :
from [195.62.32.21] (port=49191 helo=yoke.bloodpressure.buzz) :
Wed, 30 Dec 2020 22:04:26 +1100
2020-12-31 06:23:57
111.90.150.240 spambotsattackproxynormal
Gauaah ngemis ajg
2021-01-05 21:27:51
183.63.253.200 botsproxy
183.63.253.200
2020-12-28 11:55:35
49.51.160.77 spamattack
port 6003
2020-12-31 13:09:30
111.90.150.204 attackproxy
good looking
2020-12-25 17:30:57
185.63.253.200 spambotsattackproxynormal
Kiki
2021-01-05 23:14:06
183.63.253.200 botsproxy
183.63.253.200
2020-12-28 11:55:30
255.255.255.244 attack
Spam
2021-01-08 22:29:01
49.37.163.151 attack
Tried to connect to my network
2021-01-03 01:25:32
123.26.129.146 attack
denied winbox/dude connect from 123.26.129.146
2020-12-30 15:12:57
183.63.253.200 botsproxy
183.63.253.200
2020-12-28 11:55:34
185.63.253.200 spambotsattackproxynormal
Bokep taxsi
2020-12-28 07:27:18
417A proxy
Bahagia
2021-01-04 03:25:36

Recently Reported IPs

192.184.142.235 96.175.85.224 162.239.215.127 53.186.109.105
12.214.153.176 52.233.210.87 60.195.53.202 179.36.213.112
85.212.153.157 171.245.71.132 14.250.180.51 80.62.58.180
49.40.212.237 83.27.178.56 209.85.214.195 111.161.7.170
185.148.39.116 27.110.187.244 71.129.174.63 18.227.208.236