Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.252.16.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.252.16.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 17:54:35 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 12.16.252.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 214.252.16.12.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
105.144.124.52 proxy
تم سرقة حسابي في اميل
2020-07-19 01:10:26
105.144.124.52 proxy
تم سرقة حسابي في اميل
2020-07-19 01:09:59
222.110.165.141 attackspambots
(sshd) Failed SSH login from 222.110.165.141 (KR/South Korea/-): 10 in the last 3600 secs
2020-07-19 01:28:46
62.28.217.62 attack
Jul 18 17:11:19 gospond sshd[22533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.217.62 
Jul 18 17:11:19 gospond sshd[22533]: Invalid user pentaho from 62.28.217.62 port 57043
Jul 18 17:11:21 gospond sshd[22533]: Failed password for invalid user pentaho from 62.28.217.62 port 57043 ssh2
...
2020-07-19 01:22:23
150.136.21.93 attackbotsspam
Invalid user hadoop from 150.136.21.93 port 34980
2020-07-19 01:07:19
113.125.121.201 attackbots
Invalid user kevin from 113.125.121.201 port 60584
2020-07-19 01:15:04
128.199.84.251 attackspambots
'Fail2Ban'
2020-07-19 01:09:08
5.132.115.161 attackbotsspam
SSH Brute Force
2020-07-19 01:27:51
64.227.2.96 attackbots
SSH bruteforce
2020-07-19 01:21:55
104.248.22.27 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-19 01:18:43
185.117.215.9 attack
SSH Brute-Force attacks
2020-07-19 01:02:25
23.129.64.197 attackbotsspam
(mod_security) mod_security (id:218420) triggered by 23.129.64.197 (US/United States/-): 5 in the last 3600 secs
2020-07-19 01:26:42
46.101.251.228 attack
Invalid user ubnt from 46.101.251.228 port 40132
2020-07-19 01:25:01
119.28.132.211 attackbots
Jul 18 17:58:17 rocket sshd[22204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.132.211
Jul 18 17:58:20 rocket sshd[22204]: Failed password for invalid user ftpuser from 119.28.132.211 port 54136 ssh2
...
2020-07-19 01:11:09
138.197.130.138 attackbotsspam
Invalid user shu from 138.197.130.138 port 51326
2020-07-19 01:07:55

Recently Reported IPs

90.57.24.44 71.1.143.140 98.45.5.229 83.2.98.183
81.175.168.164 245.189.162.209 60.109.46.93 17.28.211.65
12.107.162.125 173.57.109.189 238.152.138.122 149.221.40.103
130.68.236.123 168.246.11.210 171.3.170.154 121.32.125.137
133.134.227.230 40.169.187.18 244.233.191.161 193.34.78.37