Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Newark

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.75.12.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11007
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;214.75.12.43.			IN	A

;; AUTHORITY SECTION:
.			353	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100301 1800 900 604800 86400

;; Query time: 214 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 04 12:01:01 CST 2019
;; MSG SIZE  rcvd: 116
Host info
43.12.75.214.in-addr.arpa domain name pointer dha-12-43.health.mil.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
43.12.75.214.in-addr.arpa	name = dha-12-43.health.mil.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
134.209.165.41 attackbotsspam
Rude login attack (5 tries in 1d)
2019-12-27 18:30:34
217.112.142.25 attack
postfix (unknown user, SPF fail or relay access denied)
2019-12-27 18:41:08
202.28.45.130 attackbots
Unauthorized connection attempt from IP address 202.28.45.130 on Port 445(SMB)
2019-12-27 18:01:00
41.82.212.193 attackspambots
$f2bV_matches
2019-12-27 18:18:13
119.42.175.200 attackspam
Invalid user server from 119.42.175.200 port 40512
2019-12-27 18:30:51
115.159.65.195 attackbots
Dec 27 10:33:46 MK-Soft-Root1 sshd[23916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.65.195 
Dec 27 10:33:48 MK-Soft-Root1 sshd[23916]: Failed password for invalid user madison from 115.159.65.195 port 58248 ssh2
...
2019-12-27 18:31:10
47.52.103.93 attack
Host Scan
2019-12-27 18:17:05
1.34.194.100 attackspambots
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(12271226)
2019-12-27 18:26:48
182.180.142.71 attack
Dec 27 08:29:06 h2177944 sshd\[17630\]: Invalid user mitten from 182.180.142.71 port 35904
Dec 27 08:29:06 h2177944 sshd\[17630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.180.142.71
Dec 27 08:29:09 h2177944 sshd\[17630\]: Failed password for invalid user mitten from 182.180.142.71 port 35904 ssh2
Dec 27 08:53:40 h2177944 sshd\[18892\]: Invalid user denise from 182.180.142.71 port 33106
...
2019-12-27 18:27:41
185.175.93.21 attack
12/27/2019-10:51:15.060095 185.175.93.21 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-27 18:26:16
123.21.13.109 attack
Dec 27 07:25:37 vpn01 sshd[10169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.21.13.109
Dec 27 07:25:39 vpn01 sshd[10169]: Failed password for invalid user admin from 123.21.13.109 port 56145 ssh2
...
2019-12-27 18:32:41
196.1.208.226 attackbotsspam
Automatic report - Banned IP Access
2019-12-27 18:31:26
41.76.8.16 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-27 18:16:40
179.216.24.38 attack
Dec 27 11:09:04 cavern sshd[25465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.216.24.38
2019-12-27 18:32:12
183.82.251.200 attack
1577427973 - 12/27/2019 07:26:13 Host: 183.82.251.200/183.82.251.200 Port: 445 TCP Blocked
2019-12-27 18:09:19

Recently Reported IPs

184.22.91.21 206.106.234.222 192.42.100.212 80.247.97.180
191.241.185.152 213.49.72.202 210.6.208.53 47.194.226.237
53.172.134.10 110.254.29.35 218.212.10.128 69.33.175.24
61.207.207.180 122.156.68.130 125.168.130.84 223.88.151.123
185.4.219.180 54.211.138.65 17.99.238.91 85.126.229.113