Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.200.96.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14162
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.200.96.117.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030200 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 17:11:43 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 117.96.200.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 214.200.96.117.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
111.93.93.180 normal
Computer ki sayta see ham jivan ki aneak jarurat Puri kar skate hai
2020-09-01 20:13:35
192.241.232.96 attack
 TCP (SYN) 192.241.232.96:49400 -> port 995, len 40
2020-09-01 20:06:28
183.88.16.192 attackbots
Unauthorized connection attempt from IP address 183.88.16.192 on Port 445(SMB)
2020-09-01 20:08:43
177.222.140.96 attackspambots
Automatic report - Port Scan Attack
2020-09-01 19:48:43
66.96.237.69 attack
Unauthorized connection attempt from IP address 66.96.237.69 on Port 445(SMB)
2020-09-01 19:32:51
14.165.27.156 attackspam
Attempted connection to port 445.
2020-09-01 19:45:15
111.229.251.35 attackspam
Invalid user ubuntu from 111.229.251.35 port 49692
2020-09-01 19:43:57
183.80.50.36 attack
Sep  1 04:45:39 host imapd-ssl: LOGIN FAILED, user=pvsi[at][munged], ip=[::ffff:183.80.50.36]
Sep  1 04:45:45 host imapd-ssl: LOGIN FAILED, user=pvsi[at][munged], ip=[::ffff:183.80.50.36]
Sep  1 04:45:51 host imapd-ssl: LOGIN FAILED, user=pvsi[at][munged], ip=[::ffff:183.80.50.36]
Sep  1 04:45:57 host imapd-ssl: LOGIN FAILED, user=pvsi[at][munged], ip=[::ffff:183.80.50.36]
Sep  1 04:46:03 host imapd-ssl: LOGIN FAILED, user=pvsi[at][munged], ip=[::ffff:183.80.50.36]
...
2020-09-01 19:43:04
111.93.93.180 normal
Computer ki sayta see ham jivan ki aneak jarurat Puri kar skate hai
2020-09-01 20:12:52
163.172.40.236 attackbots
163.172.40.236 - - [01/Sep/2020:16:14:11 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-09-01 20:14:22
185.220.102.6 attackbots
$f2bV_matches
2020-09-01 19:54:41
42.194.183.148 attackbotsspam
Unauthorized connection attempt detected from IP address 42.194.183.148 to port 5375 [T]
2020-09-01 19:33:53
92.118.161.53 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 80 - port: 1024 proto: tcp cat: Misc Attackbytes: 60
2020-09-01 19:51:05
54.36.182.244 attackbotsspam
Sep  1 07:25:48 host sshd\[30747\]: Invalid user ftpuser from 54.36.182.244
Sep  1 07:25:48 host sshd\[30747\]: Failed password for invalid user ftpuser from 54.36.182.244 port 46052 ssh2
Sep  1 07:29:15 host sshd\[30889\]: Invalid user hadoop from 54.36.182.244
Sep  1 07:29:15 host sshd\[30889\]: Failed password for invalid user hadoop from 54.36.182.244 port 49260 ssh2
...
2020-09-01 19:52:04
109.199.51.54 attackspambots
Automatic report - Port Scan Attack
2020-09-01 19:39:04

Recently Reported IPs

90.225.174.112 242.109.106.86 205.45.175.83 121.239.228.49
190.44.50.11 94.30.169.132 47.177.86.180 204.221.229.167
210.184.246.46 119.196.86.23 186.177.141.19 200.81.248.128
85.129.247.209 43.60.55.248 152.0.98.17 20.129.170.80
182.102.179.147 109.53.223.1 191.131.7.29 177.230.136.20