Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.90.113.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63341
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.90.113.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121200 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 15:04:43 CST 2024
;; MSG SIZE  rcvd: 106
Host info
b'Host 12.113.90.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.113.90.214.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
193.188.22.193 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-17 19:20:05
84.52.108.218 attack
email spam
2019-08-17 19:31:02
196.188.178.237 spambotsattack
scam attempt made from this ip address
2019-08-17 19:14:53
78.128.113.73 attackbots
Aug 17 12:56:35 mail postfix/smtpd\[17814\]: warning: unknown\[78.128.113.73\]: SASL PLAIN authentication failed: \
Aug 17 12:56:42 mail postfix/smtpd\[19902\]: warning: unknown\[78.128.113.73\]: SASL PLAIN authentication failed: \
Aug 17 13:06:43 mail postfix/smtpd\[19903\]: warning: unknown\[78.128.113.73\]: SASL PLAIN authentication failed: \
Aug 17 13:39:08 mail postfix/smtpd\[19903\]: warning: unknown\[78.128.113.73\]: SASL PLAIN authentication failed: \
2019-08-17 19:43:18
58.64.144.108 attackspambots
Aug 17 17:00:16 itv-usvr-01 sshd[9449]: Invalid user kigwa from 58.64.144.108
Aug 17 17:00:16 itv-usvr-01 sshd[9449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.64.144.108
Aug 17 17:00:16 itv-usvr-01 sshd[9449]: Invalid user kigwa from 58.64.144.108
Aug 17 17:00:18 itv-usvr-01 sshd[9449]: Failed password for invalid user kigwa from 58.64.144.108 port 52342 ssh2
Aug 17 17:06:43 itv-usvr-01 sshd[9685]: Invalid user walter from 58.64.144.108
2019-08-17 19:43:56
38.64.178.194 attackspam
Mail sent to address hacked/leaked from Last.fm
2019-08-17 19:14:18
185.220.100.252 attackbots
Aug 17 13:16:15 v22018076622670303 sshd\[14942\]: Invalid user admin from 185.220.100.252 port 33474
Aug 17 13:16:15 v22018076622670303 sshd\[14942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.100.252
Aug 17 13:16:17 v22018076622670303 sshd\[14942\]: Failed password for invalid user admin from 185.220.100.252 port 33474 ssh2
...
2019-08-17 19:18:29
182.103.247.149 attackspambots
Distributed brute force attack
2019-08-17 19:10:00
50.197.162.169 attackspam
email spam
2019-08-17 19:39:37
198.96.155.3 attackbots
2019-08-17T11:10:24.767645abusebot-5.cloudsearch.cf sshd\[20611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=exit.tor.uwaterloo.ca  user=root
2019-08-17 19:37:38
157.25.160.75 attackbotsspam
Automatic report - Banned IP Access
2019-08-17 19:32:41
220.126.227.74 attackbotsspam
Aug 17 12:49:59 vps691689 sshd[18477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.126.227.74
Aug 17 12:50:01 vps691689 sshd[18477]: Failed password for invalid user michael from 220.126.227.74 port 47934 ssh2
Aug 17 12:55:17 vps691689 sshd[18578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.126.227.74
...
2019-08-17 19:07:52
77.40.85.68 attackspam
2019-08-17T12:28:59.196288mail01 postfix/smtpd[3318]: warning: unknown[77.40.85.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-17T12:31:27.161283mail01 postfix/smtpd[3318]: warning: unknown[77.40.85.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-17T12:33:37.195079mail01 postfix/smtpd[3318]: warning: unknown[77.40.85.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-17 19:33:04
104.236.33.155 attackbots
Aug 15 14:41:51 mail sshd[15901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.33.155  user=root
Aug 15 14:41:53 mail sshd[15901]: Failed password for root from 104.236.33.155 port 42894 ssh2
Aug 15 14:56:19 mail sshd[17649]: Invalid user admin from 104.236.33.155
Aug 15 14:56:19 mail sshd[17649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.33.155
Aug 15 14:56:19 mail sshd[17649]: Invalid user admin from 104.236.33.155
Aug 15 14:56:21 mail sshd[17649]: Failed password for invalid user admin from 104.236.33.155 port 36850 ssh2
...
2019-08-17 19:44:29
179.185.241.33 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-08-17 19:49:44

Recently Reported IPs

246.94.101.195 193.30.169.119 104.253.45.37 32.238.89.27
205.11.21.119 169.215.163.195 55.24.2.114 229.189.198.5
99.97.105.186 65.238.63.228 97.91.202.230 42.44.135.220
164.34.128.85 250.132.52.173 114.50.154.207 172.73.203.163
142.250.67.211 108.34.125.45 176.68.23.28 209.216.101.57