Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.212.195.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39391
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.212.195.205.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:15:26 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 205.195.212.214.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 214.212.195.205.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
2.47.198.217 attackspam
firewall-block, port(s): 23/tcp
2020-05-30 15:56:58
191.232.236.24 attackspam
DATE:2020-05-30 06:07:13, IP:191.232.236.24, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-05-30 15:50:32
122.252.239.5 attackspambots
Failed password for invalid user root from 122.252.239.5 port 35660 ssh2
2020-05-30 15:47:41
123.185.9.217 attackbotsspam
Unauthorized connection attempt detected from IP address 123.185.9.217 to port 23
2020-05-30 15:47:23
116.92.213.114 attack
May 28 03:00:54 localhost sshd[529051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.92.213.114  user=r.r
May 28 03:00:56 localhost sshd[529051]: Failed password for r.r from 116.92.213.114 port 51598 ssh2
May 28 03:12:22 localhost sshd[531416]: Invalid user odoo from 116.92.213.114 port 56836
May 28 03:12:23 localhost sshd[531416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.92.213.114 
May 28 03:12:22 localhost sshd[531416]: Invalid user odoo from 116.92.213.114 port 56836
May 28 03:12:24 localhost sshd[531416]: Failed password for invalid user odoo from 116.92.213.114 port 56836 ssh2
May 28 03:16:39 localhost sshd[532503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.92.213.114  user=r.r
May 28 03:16:41 localhost sshd[532503]: Failed password for r.r from 116.92.213.114 port 40404 ssh2
May 28 03:20:45 localhost sshd[533652]: Inv........
------------------------------
2020-05-30 16:09:33
211.97.81.137 attackbotsspam
Invalid user default from 211.97.81.137 port 51234
2020-05-30 16:10:20
162.243.138.126 attackspambots
firewall-block, port(s): 9042/tcp
2020-05-30 15:42:59
180.190.172.246 attackbotsspam
Automatic report - Port Scan Attack
2020-05-30 15:39:06
212.64.43.52 attackbotsspam
Invalid user ginger from 212.64.43.52 port 59338
2020-05-30 16:03:23
171.239.181.140 attackbots
Automatic report - Banned IP Access
2020-05-30 15:54:10
111.229.63.21 attackbots
Invalid user vanzandt from 111.229.63.21 port 34062
2020-05-30 15:30:49
218.92.0.205 attackbots
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-05-30 16:11:14
162.247.74.7 attackspambots
May 30 05:49:58 hell sshd[20794]: Failed password for sshd from 162.247.74.7 port 40576 ssh2
May 30 05:50:01 hell sshd[20794]: Failed password for sshd from 162.247.74.7 port 40576 ssh2
...
2020-05-30 15:54:41
89.248.168.196 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 83 - port: 9200 proto: TCP cat: Misc Attack
2020-05-30 16:11:01
162.223.90.115 attack
May 30 09:25:45 legacy sshd[10058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.223.90.115
May 30 09:25:47 legacy sshd[10058]: Failed password for invalid user devil from 162.223.90.115 port 37174 ssh2
May 30 09:29:38 legacy sshd[10191]: Failed password for root from 162.223.90.115 port 41904 ssh2
...
2020-05-30 16:12:34

Recently Reported IPs

82.108.107.63 135.126.148.181 38.22.208.69 36.204.30.100
241.94.241.195 189.0.52.75 178.131.186.76 189.42.224.194
7.232.223.49 55.143.164.1 101.153.118.171 190.197.204.174
162.154.25.40 253.152.220.204 170.217.104.136 14.211.248.21
126.93.14.91 144.14.18.23 191.125.47.170 109.228.158.175