Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.12.189.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29028
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.12.189.252.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 02:19:01 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 252.189.12.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 214.12.189.252.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
190.96.119.14 attack
May  9 01:45:43 minden010 sshd[23142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.96.119.14
May  9 01:45:45 minden010 sshd[23142]: Failed password for invalid user dominic from 190.96.119.14 port 58464 ssh2
May  9 01:50:12 minden010 sshd[24670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.96.119.14
...
2020-05-10 02:03:22
125.124.193.237 attackspam
SSH brutforce
2020-05-10 01:31:09
51.83.171.20 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 37 - port: 48989 proto: TCP cat: Misc Attack
2020-05-10 01:25:10
116.100.230.90 attack
Automatic report - Port Scan Attack
2020-05-10 02:07:21
145.239.33.105 attack
This IP is associated with RDP abuse. It was found in a paste by https://twitter.com/RdpSnitch - https://pastebin.com/GUpJ3eiL  
For more information, or to report interesting/incorrect findings, contact us - bot@tines.io
2020-05-10 01:39:26
14.98.200.167 attack
Unauthorized SSH login attempts
2020-05-10 01:23:32
93.81.182.181 attackspambots
Unauthorized connection attempt from IP address 93.81.182.181 on Port 445(SMB)
2020-05-10 01:32:08
164.132.73.220 attack
k+ssh-bruteforce
2020-05-10 01:53:14
185.153.208.21 attackbots
(sshd) Failed SSH login from 185.153.208.21 (IR/Iran/-/-/-/[AS49100 Pishgaman Toseeh Ertebatat Company (Private Joint Stock)]): 1 in the last 3600 secs
2020-05-10 01:31:22
185.153.196.102 attackbots
Port scan on 16 port(s): 64687 64725 64731 64886 64892 64895 64905 64936 64947 64970 65217 65237 65250 65273 65279 65289
2020-05-10 02:00:20
216.243.31.2 attackspam
Firewall Dropped Connection
2020-05-10 01:41:27
193.112.252.254 attackspam
May  9 02:49:24 piServer sshd[30301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.252.254 
May  9 02:49:25 piServer sshd[30301]: Failed password for invalid user sbr from 193.112.252.254 port 42022 ssh2
May  9 02:55:06 piServer sshd[30672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.252.254 
...
2020-05-10 01:28:01
207.244.70.35 attack
Wordpress hack xmlrpc or wp-login
2020-05-10 01:37:16
31.220.1.210 attackspam
srv02 SSH BruteForce Attacks 22 ..
2020-05-10 01:47:55
2.181.117.188 attackbotsspam
9001/tcp
[2020-05-06]1pkt
2020-05-10 01:27:38

Recently Reported IPs

13.192.249.237 194.92.11.131 160.38.219.21 29.217.194.48
250.14.53.231 183.34.129.220 213.161.21.238 86.101.216.160
76.101.64.213 5.136.19.92 41.9.156.89 90.168.115.221
204.121.36.61 129.114.170.165 92.56.118.240 194.26.55.111
212.61.132.181 54.155.127.104 159.210.214.63 66.157.75.143