Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.212.145.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48335
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.212.145.240.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 11:28:51 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'Host 240.145.212.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 214.212.145.240.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.142 attackspambots
Jul 14 14:39:01 mellenthin sshd[7637]: Failed none for invalid user root from 222.186.173.142 port 9526 ssh2
Jul 14 14:39:01 mellenthin sshd[7637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
2020-07-14 20:43:09
209.97.160.184 attackbotsspam
Invalid user ssh from 209.97.160.184 port 34754
2020-07-14 20:43:58
178.62.60.233 attackspambots
Jul 14 14:40:09 home sshd[20930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.60.233
Jul 14 14:40:12 home sshd[20930]: Failed password for invalid user mironov from 178.62.60.233 port 55000 ssh2
Jul 14 14:43:14 home sshd[21281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.60.233
...
2020-07-14 20:46:35
66.112.218.245 attackbotsspam
Invalid user backup from 66.112.218.245 port 39882
2020-07-14 21:06:43
51.159.28.62 attackspambots
Jul 14 14:26:03 home sshd[18948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.159.28.62
Jul 14 14:26:06 home sshd[18948]: Failed password for invalid user lora from 51.159.28.62 port 39444 ssh2
Jul 14 14:34:11 home sshd[20023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.159.28.62
...
2020-07-14 20:52:25
95.82.124.31 attackbotsspam
Invalid user user1 from 95.82.124.31 port 44358
2020-07-14 21:05:25
94.177.231.4 attack
Invalid user user3 from 94.177.231.4 port 38478
2020-07-14 20:49:51
49.232.100.132 attackbots
(sshd) Failed SSH login from 49.232.100.132 (CN/China/-): 5 in the last 3600 secs
2020-07-14 21:10:55
83.118.205.162 attack
Jul 14 14:53:18 home sshd[22600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.118.205.162
Jul 14 14:53:21 home sshd[22600]: Failed password for invalid user wanglj from 83.118.205.162 port 27305 ssh2
Jul 14 14:56:53 home sshd[23051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.118.205.162
...
2020-07-14 21:05:45
185.164.138.21 attack
Invalid user mongo from 185.164.138.21 port 56562
2020-07-14 20:56:32
180.218.74.56 attackspambots
Port probing on unauthorized port 445
2020-07-14 20:57:47
121.160.139.118 attackspam
Invalid user lzf from 121.160.139.118 port 37478
2020-07-14 21:03:16
13.79.147.107 attack
SSH bruteforce
2020-07-14 20:40:44
49.51.90.173 attackspambots
Invalid user postgres from 49.51.90.173 port 44454
2020-07-14 21:11:26
92.222.78.178 attackbots
Invalid user roxana from 92.222.78.178 port 42218
2020-07-14 20:50:23

Recently Reported IPs

45.87.31.218 139.45.105.255 148.46.169.93 157.154.107.148
70.10.104.2 237.236.21.10 209.214.167.209 91.75.176.87
94.152.125.58 254.135.244.211 227.234.241.38 225.192.145.56
65.0.236.7 132.32.108.83 178.103.225.197 221.94.127.156
26.230.154.195 208.111.76.158 39.252.230.148 86.30.145.99