Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sydney

Region: New South Wales

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.214.44.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4240
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;218.214.44.212.			IN	A

;; AUTHORITY SECTION:
.			287	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020041501 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 16 06:39:50 CST 2020
;; MSG SIZE  rcvd: 118
Host info
212.44.214.218.in-addr.arpa domain name pointer 212.44.214.218.sta.commander.net.au.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
212.44.214.218.in-addr.arpa	name = 212.44.214.218.sta.commander.net.au.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
153.36.236.35 attack
2019-07-21T06:24:31.248438hub.schaetter.us sshd\[13822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.35  user=root
2019-07-21T06:24:33.179215hub.schaetter.us sshd\[13822\]: Failed password for root from 153.36.236.35 port 55506 ssh2
2019-07-21T06:24:35.699527hub.schaetter.us sshd\[13822\]: Failed password for root from 153.36.236.35 port 55506 ssh2
2019-07-21T06:24:38.140688hub.schaetter.us sshd\[13822\]: Failed password for root from 153.36.236.35 port 55506 ssh2
2019-07-21T06:24:40.652115hub.schaetter.us sshd\[13826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.35  user=root
...
2019-07-21 14:33:00
36.79.77.29 attackspambots
Sat, 20 Jul 2019 21:53:51 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:01:00
220.255.130.86 attackspam
Sat, 20 Jul 2019 21:53:53 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:52:10
41.93.47.69 attack
Sat, 20 Jul 2019 21:53:58 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:36:48
14.160.37.6 attackbotsspam
Sat, 20 Jul 2019 21:53:56 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:45:07
185.255.46.229 attack
2048
2019-07-21 14:58:44
36.75.155.1 attackspambots
Sat, 20 Jul 2019 21:53:59 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:37:07
118.99.98.143 attack
Sat, 20 Jul 2019 21:54:05 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:19:15
139.199.48.216 attackbots
Jul 21 01:54:03 aat-srv002 sshd[3207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.48.216
Jul 21 01:54:06 aat-srv002 sshd[3207]: Failed password for invalid user buster from 139.199.48.216 port 33304 ssh2
Jul 21 01:57:50 aat-srv002 sshd[3270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.48.216
Jul 21 01:57:51 aat-srv002 sshd[3270]: Failed password for invalid user wolfgang from 139.199.48.216 port 38984 ssh2
...
2019-07-21 14:58:16
186.203.197.178 attackbots
Sat, 20 Jul 2019 21:54:05 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:15:17
115.84.115.20 attackspambots
Sat, 20 Jul 2019 21:54:08 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:09:49
45.116.233.13 attack
Sat, 20 Jul 2019 21:53:58 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:38:52
5.62.145.121 attackbotsspam
Sat, 20 Jul 2019 21:54:01 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:31:08
49.147.127.105 attackbots
Sat, 20 Jul 2019 21:53:57 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:42:25
96.30.109.183 attackspam
Sat, 20 Jul 2019 21:53:55 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:46:06

Recently Reported IPs

105.152.184.14 67.251.31.139 83.217.70.148 102.187.108.82
195.15.135.198 79.191.67.189 2.110.251.77 60.20.233.214
168.80.82.119 200.56.31.20 136.240.202.104 125.165.101.38
66.103.77.54 65.82.41.101 62.48.251.209 151.170.160.193
219.67.8.18 82.83.211.109 27.214.36.137 212.3.254.65