Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Barcelona

Region: Catalonia

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 213.242.114.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25623
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;213.242.114.213.		IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 17:58:24 CST 2021
;; MSG SIZE  rcvd: 44

'
Host info
213.114.242.213.in-addr.arpa domain name pointer ae56.bar2.Barcelona1.Level3.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.114.242.213.in-addr.arpa	name = ae56.bar2.Barcelona1.Level3.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.89 attackspam
May  2 21:06:31 ns381471 sshd[25977]: Failed password for root from 112.85.42.89 port 43874 ssh2
2020-05-03 03:22:02
78.203.125.150 attackbotsspam
Port scan
2020-05-03 03:53:31
191.54.190.130 attack
Honeypot attack, port: 4567, PTR: 191-054-190-130.xd-dynamic.algarnetsuper.com.br.
2020-05-03 03:25:14
109.169.20.190 attackbotsspam
"fail2ban match"
2020-05-03 03:51:34
217.182.71.54 attackbots
Invalid user oracle from 217.182.71.54 port 56940
2020-05-03 03:48:31
129.226.70.74 attack
20 attempts against mh-misbehave-ban on pluto
2020-05-03 03:26:12
115.97.101.170 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-03 03:36:30
85.99.223.152 attack
Unauthorized connection attempt detected from IP address 85.99.223.152 to port 23
2020-05-03 03:52:36
58.221.90.14 attack
Unauthorised access (May  2) SRC=58.221.90.14 LEN=48 TTL=51 ID=7451 DF TCP DPT=1433 WINDOW=65535 SYN
2020-05-03 03:40:22
14.234.95.105 attackbots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-05-03 03:44:57
185.175.93.14 attackspam
May  2 21:12:10 debian-2gb-nbg1-2 kernel: \[10705637.631263\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.14 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=48946 PROTO=TCP SPT=41033 DPT=3322 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-03 03:18:53
92.222.71.130 attackspam
May  2 14:22:16 vps46666688 sshd[31705]: Failed password for root from 92.222.71.130 port 58132 ssh2
...
2020-05-03 03:21:00
89.82.248.54 attack
10 failed SSH/Telnet login attempts between 2020-05-02T10:33:03Z and 2020-05-02T12:07:17Z
2020-05-03 03:38:23
222.186.175.215 attackbots
May  2 21:14:22 pve1 sshd[7568]: Failed password for root from 222.186.175.215 port 50774 ssh2
May  2 21:14:27 pve1 sshd[7568]: Failed password for root from 222.186.175.215 port 50774 ssh2
...
2020-05-03 03:24:49
86.127.211.26 attackspambots
Repeated attempts against wp-login
2020-05-03 03:19:11

Recently Reported IPs

2.46.94.58 52.46.94.58 180.163.238.165 78.133.206.147
52.98.42.226 162.247.243.239 176.167.66.6 20.140.48.71
112.118.196.113 89.72.46.244 185.169.255.25 76.69.6.154
178.235.187.5 141.164.36.132 185.63.153.157 94.153.35.150
194.36.110.182 199.0.0.0 45.12.223.84 195.62.46.218