Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Multicast Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 231.117.137.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31750
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;231.117.137.214.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 10:33:24 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 214.137.117.231.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.137.117.231.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.206.120.250 attackspam
1433/tcp 1433/tcp
[2019-10-15/11-16]2pkt
2019-11-16 23:02:43
85.209.42.22 attackbotsspam
Unauthorised access (Nov 16) SRC=85.209.42.22 LEN=48 PREC=0x20 TTL=225 ID=12484 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-16 22:30:13
186.10.64.2 attack
k+ssh-bruteforce
2019-11-16 22:35:51
54.37.67.144 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2019-11-16 23:04:22
70.45.104.86 attackspam
Unauthorised access (Nov 16) SRC=70.45.104.86 LEN=52 TTL=108 ID=12969 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-16 22:50:02
139.59.26.106 attackspam
Automatic report - Banned IP Access
2019-11-16 22:47:00
104.238.221.106 attackbotsspam
Nov 16 14:34:04 game-panel sshd[18915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.238.221.106
Nov 16 14:34:06 game-panel sshd[18915]: Failed password for invalid user guest from 104.238.221.106 port 54258 ssh2
Nov 16 14:38:14 game-panel sshd[19011]: Failed password for root from 104.238.221.106 port 35844 ssh2
2019-11-16 22:53:12
202.96.137.99 attackspam
1433/tcp 1433/tcp 1433/tcp
[2019-10-20/11-16]3pkt
2019-11-16 23:02:06
178.33.236.23 attackbotsspam
Invalid user backup from 178.33.236.23 port 54710
2019-11-16 22:48:45
203.234.19.83 attack
Nov 16 04:49:36 hpm sshd\[9377\]: Invalid user test from 203.234.19.83
Nov 16 04:49:36 hpm sshd\[9377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.234.19.83
Nov 16 04:49:38 hpm sshd\[9377\]: Failed password for invalid user test from 203.234.19.83 port 60806 ssh2
Nov 16 04:54:18 hpm sshd\[9746\]: Invalid user barris from 203.234.19.83
Nov 16 04:54:18 hpm sshd\[9746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.234.19.83
2019-11-16 23:03:04
37.119.230.22 attackspam
Nov 16 09:26:59 lnxweb62 sshd[10716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.119.230.22
2019-11-16 22:44:40
14.242.212.133 attackspam
Unauthorized connection attempt from IP address 14.242.212.133 on Port 445(SMB)
2019-11-16 22:42:57
109.122.59.228 attack
445/tcp 445/tcp 445/tcp
[2019-10-07/11-16]3pkt
2019-11-16 22:58:16
194.37.92.48 attackbotsspam
k+ssh-bruteforce
2019-11-16 22:36:23
195.154.108.194 attack
Nov 16 15:54:21 icinga sshd[15201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.108.194
Nov 16 15:54:23 icinga sshd[15201]: Failed password for invalid user ctrls from 195.154.108.194 port 49900 ssh2
...
2019-11-16 22:56:32

Recently Reported IPs

97.141.136.128 177.166.2.116 67.135.220.131 229.172.80.61
62.211.57.133 152.187.15.82 76.64.106.194 139.242.67.159
136.24.99.197 202.39.62.211 167.134.134.132 19.111.73.99
253.78.227.237 146.172.105.158 146.137.208.157 175.44.47.251
177.205.57.122 13.20.105.72 113.49.251.78 207.230.200.249