Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Newark

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.141.212.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57953
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;214.141.212.25.			IN	A

;; AUTHORITY SECTION:
.			340	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010300 1800 900 604800 86400

;; Query time: 119 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 03 22:23:54 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 25.212.141.214.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 25.212.141.214.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
196.28.236.5 attack
 TCP (SYN) 196.28.236.5:55393 -> port 445, len 52
2020-09-02 17:49:13
124.152.118.131 attackspambots
Sep  1 19:44:55 Host-KLAX-C sshd[30123]: Disconnected from invalid user root 124.152.118.131 port 4660 [preauth]
...
2020-09-02 17:32:31
109.71.237.13 attackbots
Sep  1 19:27:30 web9 sshd\[24382\]: Invalid user wyf from 109.71.237.13
Sep  1 19:27:30 web9 sshd\[24382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.71.237.13
Sep  1 19:27:32 web9 sshd\[24382\]: Failed password for invalid user wyf from 109.71.237.13 port 44341 ssh2
Sep  1 19:29:30 web9 sshd\[24610\]: Invalid user jenkins from 109.71.237.13
Sep  1 19:29:30 web9 sshd\[24610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.71.237.13
2020-09-02 17:07:03
5.196.198.147 attackbotsspam
SSH brute force
2020-09-02 17:37:20
105.112.123.233 attack
1598978564 - 09/01/2020 18:42:44 Host: 105.112.123.233/105.112.123.233 Port: 445 TCP Blocked
2020-09-02 17:39:13
124.187.234.36 attackbots
Automatic report - Port Scan Attack
2020-09-02 17:35:53
160.155.53.22 attackspambots
Sep  2 11:17:30 pve1 sshd[10415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.155.53.22 
Sep  2 11:17:32 pve1 sshd[10415]: Failed password for invalid user next from 160.155.53.22 port 58466 ssh2
...
2020-09-02 17:40:38
192.99.34.42 attack
192.99.34.42 - - [02/Sep/2020:09:17:15 +0100] "POST /wp-login.php HTTP/1.1" 200 5249 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.34.42 - - [02/Sep/2020:09:20:17 +0100] "POST /wp-login.php HTTP/1.1" 200 5249 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.34.42 - - [02/Sep/2020:09:23:18 +0100] "POST /wp-login.php HTTP/1.1" 200 5249 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-09-02 17:22:09
142.93.195.249 attackbots
Auto Fail2Ban report, multiple SSH login attempts.
2020-09-02 17:41:52
154.28.188.105 attack
Qnap nas login attempts
2020-09-02 17:19:51
37.49.229.237 attack
SIP portscan/brute-force
2020-09-02 17:18:50
5.104.50.149 attack
20/9/1@12:42:42: FAIL: Alarm-Network address from=5.104.50.149
20/9/1@12:42:43: FAIL: Alarm-Network address from=5.104.50.149
...
2020-09-02 17:41:05
187.160.8.47 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-02 17:24:22
189.207.108.136 attack
Automatic report - Port Scan Attack
2020-09-02 17:42:30
222.186.173.201 attackspam
Sep  2 11:23:05 jane sshd[2121]: Failed password for root from 222.186.173.201 port 8120 ssh2
Sep  2 11:23:10 jane sshd[2121]: Failed password for root from 222.186.173.201 port 8120 ssh2
...
2020-09-02 17:29:07

Recently Reported IPs

212.253.3.91 40.68.60.241 43.143.69.114 106.54.37.223
129.18.176.104 77.3.13.122 105.97.51.138 122.51.175.175
88.247.98.32 77.42.93.191 118.145.8.30 59.92.185.46
198.167.52.10 34.89.54.237 210.17.201.15 43.225.100.228
119.101.203.205 111.255.5.45 37.225.66.144 187.62.195.39