Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: DoD Network Information Center

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.245.239.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 800
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;214.245.239.8.			IN	A

;; AUTHORITY SECTION:
.			3143	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062201 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 22 16:30:09 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 8.239.245.214.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 8.239.245.214.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.255.39.38 attackbots
Unauthorised access (Feb 22) SRC=190.255.39.38 LEN=40 TTL=242 ID=11112 TCP DPT=1433 WINDOW=1024 SYN
2020-02-23 08:40:43
139.196.6.190 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-23 08:44:12
175.31.230.217 attackspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-02-23 08:43:56
154.83.29.114 attackspambots
$f2bV_matches
2020-02-23 08:25:56
14.181.213.235 attack
1582389738 - 02/22/2020 17:42:18 Host: 14.181.213.235/14.181.213.235 Port: 445 TCP Blocked
2020-02-23 08:16:13
181.48.29.35 attackspambots
Feb 22 17:42:21 cvbnet sshd[22862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.29.35 
Feb 22 17:42:22 cvbnet sshd[22862]: Failed password for invalid user couchdb from 181.48.29.35 port 45630 ssh2
...
2020-02-23 08:12:41
175.22.86.194 attack
Automatic report - Port Scan Attack
2020-02-23 08:51:18
181.120.246.83 attackbotsspam
Feb 23 00:51:33 lnxded63 sshd[8315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.120.246.83
Feb 23 00:51:35 lnxded63 sshd[8315]: Failed password for invalid user testftp from 181.120.246.83 port 47494 ssh2
Feb 23 00:58:22 lnxded63 sshd[8788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.120.246.83
2020-02-23 08:21:22
122.51.213.140 attack
Feb 23 00:48:41 srv-ubuntu-dev3 sshd[129626]: Invalid user margaret from 122.51.213.140
Feb 23 00:48:41 srv-ubuntu-dev3 sshd[129626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.213.140
Feb 23 00:48:41 srv-ubuntu-dev3 sshd[129626]: Invalid user margaret from 122.51.213.140
Feb 23 00:48:44 srv-ubuntu-dev3 sshd[129626]: Failed password for invalid user margaret from 122.51.213.140 port 51874 ssh2
Feb 23 00:51:29 srv-ubuntu-dev3 sshd[129916]: Invalid user gitlab-prometheus from 122.51.213.140
Feb 23 00:51:29 srv-ubuntu-dev3 sshd[129916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.213.140
Feb 23 00:51:29 srv-ubuntu-dev3 sshd[129916]: Invalid user gitlab-prometheus from 122.51.213.140
Feb 23 00:51:31 srv-ubuntu-dev3 sshd[129916]: Failed password for invalid user gitlab-prometheus from 122.51.213.140 port 48670 ssh2
Feb 23 00:58:25 srv-ubuntu-dev3 sshd[130515]: Invalid user postgres from 12
...
2020-02-23 08:22:20
112.85.42.174 attackbotsspam
IP blocked
2020-02-23 08:29:45
92.118.161.37 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 87 - port: 8443 proto: TCP cat: Misc Attack
2020-02-23 08:47:48
185.176.27.102 attack
Feb 23 00:57:11 debian-2gb-nbg1-2 kernel: \[4675036.172337\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.102 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=57916 PROTO=TCP SPT=52940 DPT=17296 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-23 08:42:53
80.82.64.219 attackspam
Fail2Ban Ban Triggered
2020-02-23 08:50:07
112.85.42.72 attack
SSH Brute Force
2020-02-23 08:30:21
201.48.34.195 attackspambots
Feb 22 17:42:18 nextcloud sshd\[8247\]: Invalid user chris from 201.48.34.195
Feb 22 17:42:18 nextcloud sshd\[8247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.34.195
Feb 22 17:42:20 nextcloud sshd\[8247\]: Failed password for invalid user chris from 201.48.34.195 port 56596 ssh2
2020-02-23 08:14:34

Recently Reported IPs

121.129.64.95 121.18.180.178 129.25.111.14 37.151.43.114
106.175.196.250 211.203.252.77 206.181.192.150 67.35.190.190
190.217.142.10 95.109.19.97 185.222.209.26 41.82.129.100
191.59.253.163 195.20.197.222 207.232.185.140 8.188.183.233
14.73.43.215 190.124.1.181 117.137.122.9 115.148.252.120