Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.214.131.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14979
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.214.131.213.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 15:16:38 CST 2025
;; MSG SIZE  rcvd: 108
Host info
213.131.214.218.in-addr.arpa domain name pointer 213.131.214.218.sta.commander.net.au.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.131.214.218.in-addr.arpa	name = 213.131.214.218.sta.commander.net.au.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.204.108.143 attack
Sep  8 08:25:40 plusreed sshd[10027]: Invalid user deploy from 129.204.108.143
...
2019-09-08 20:34:41
185.175.93.105 attackspambots
Port scan attempt detected by AWS-CCS, CTS, India
2019-09-08 19:58:33
37.105.143.134 attackspam
TCP Port: 25 _    invalid blocked abuseat-org barracudacentral _  _  _ _ (778)
2019-09-08 20:07:33
145.239.227.21 attackspam
SSH Brute Force, server-1 sshd[8339]: Failed password for invalid user webuser from 145.239.227.21 port 47614 ssh2
2019-09-08 20:36:40
159.203.199.133 attackspambots
port scan and connect, tcp 8081 (blackice-icecap)
2019-09-08 20:08:33
176.122.114.143 attackspam
TCP Port: 25 _    invalid blocked abuseat-org barracudacentral _  _  _ _ (763)
2019-09-08 20:36:09
82.114.81.134 attack
TCP Port: 25 _    invalid blocked abuseat-org barracudacentral _  _  _ _ (780)
2019-09-08 20:05:44
35.232.119.162 attackspambots
$f2bV_matches_ltvn
2019-09-08 20:43:38
27.72.103.37 attackspambots
TCP Port: 25 _    invalid blocked dnsbl-sorbs abuseat-org _  _  _ _ (782)
2019-09-08 20:02:54
121.201.17.131 attackbotsspam
23/tcp 23/tcp
[2019-09-06/08]2pkt
2019-09-08 20:27:27
177.220.205.70 attack
Sep  8 12:41:15 plex sshd[17785]: Invalid user debian from 177.220.205.70 port 43204
2019-09-08 20:26:27
109.49.183.193 attack
SSH Brute-Force reported by Fail2Ban
2019-09-08 20:44:35
188.166.7.134 attackbotsspam
Sep  8 12:16:21 MK-Soft-Root1 sshd\[12582\]: Invalid user user from 188.166.7.134 port 44572
Sep  8 12:16:21 MK-Soft-Root1 sshd\[12582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.7.134
Sep  8 12:16:23 MK-Soft-Root1 sshd\[12582\]: Failed password for invalid user user from 188.166.7.134 port 44572 ssh2
...
2019-09-08 20:23:41
178.175.39.189 attack
TCP Port: 25 _    invalid blocked abuseat-org barracudacentral _  _  _ _ (779)
2019-09-08 20:06:07
139.192.59.25 attack
TCP Port: 25 _    invalid blocked abuseat-org zen-spamhaus _  _  _ _ (770)
2019-09-08 20:19:04

Recently Reported IPs

29.185.189.196 65.201.50.40 149.84.50.77 135.0.24.73
28.4.102.158 63.141.139.199 88.123.122.154 235.66.207.46
232.70.155.188 24.85.72.54 130.246.157.174 249.39.179.105
77.25.188.120 226.9.156.225 167.89.199.142 176.185.180.166
24.175.161.91 229.162.50.212 148.123.125.218 39.215.4.34