Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: Equant Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.117.200.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14686
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;57.117.200.214.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062900 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 29 15:36:13 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 214.200.117.57.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 214.200.117.57.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.91.247.125 attack
 TCP (SYN) 51.91.247.125:55739 -> port 993, len 44
2020-07-05 21:39:34
1.207.63.62 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-07-05 22:05:16
45.162.216.10 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 26 - port: 30706 proto: TCP cat: Misc Attack
2020-07-05 22:02:49
185.53.88.198 attackspambots
ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak
2020-07-05 22:08:42
37.49.224.139 attackspam
Jul  5 07:43:00 master sshd[13137]: Failed password for root from 37.49.224.139 port 36306 ssh2
Jul  5 07:43:03 master sshd[13139]: Failed password for invalid user admin from 37.49.224.139 port 39536 ssh2
Jul  5 07:43:06 master sshd[13141]: Failed password for invalid user ubnt from 37.49.224.139 port 42388 ssh2
Jul  5 07:43:09 master sshd[13143]: Failed password for invalid user admin from 37.49.224.139 port 44952 ssh2
Jul  5 16:25:41 master sshd[16537]: Failed password for root from 37.49.224.139 port 58908 ssh2
2020-07-05 22:04:09
52.229.160.94 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 39 - port: 19932 proto: TCP cat: Misc Attack
2020-07-05 21:38:38
79.124.62.55 attackspambots
scans once in preceeding hours on the ports (in chronological order) 3391 resulting in total of 1 scans from 79.124.62.0/24 block.
2020-07-05 21:36:50
61.219.11.153 attackbots
Unauthorized connection attempt detected from IP address 61.219.11.153 to port 443 [T]
2020-07-05 21:37:22
51.68.123.198 attackbots
2020-07-05T13:38:20.387375mail.csmailer.org sshd[1817]: Failed password for root from 51.68.123.198 port 50606 ssh2
2020-07-05T13:41:40.780526mail.csmailer.org sshd[2017]: Invalid user wangchen from 51.68.123.198 port 46890
2020-07-05T13:41:40.785222mail.csmailer.org sshd[2017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.ip-51-68-123.eu
2020-07-05T13:41:40.780526mail.csmailer.org sshd[2017]: Invalid user wangchen from 51.68.123.198 port 46890
2020-07-05T13:41:42.821992mail.csmailer.org sshd[2017]: Failed password for invalid user wangchen from 51.68.123.198 port 46890 ssh2
...
2020-07-05 21:39:57
192.241.220.59 attackspambots
Unauthorized SSH login attempts
2020-07-05 22:07:59
219.138.66.239 attackbots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-07-05 21:42:25
120.31.61.215 attackbotsspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-07-05 21:52:50
71.6.232.8 attack
scans once in preceeding hours on the ports (in chronological order) 6443 resulting in total of 5 scans from 71.6.128.0/17 block.
2020-07-05 21:58:21
93.174.95.106 attackbots
scans 2 times in preceeding hours on the ports (in chronological order) 25565 4321 resulting in total of 3 scans from 93.174.88.0/21 block.
2020-07-05 21:34:40
49.88.112.109 attack
 TCP (SYN) 49.88.112.109:9090 -> port 22, len 44
2020-07-05 21:40:18

Recently Reported IPs

121.96.4.34 113.58.50.196 209.133.152.37 43.249.114.114
135.10.219.214 144.190.162.239 156.128.177.100 118.70.229.248
88.155.163.48 246.243.115.63 110.238.49.132 84.73.121.162
186.206.134.122 122.240.233.116 236.67.149.66 14.186.168.223
240b:251:521:cb00:21ed:c5aa:fad2:7f 66.44.101.233 221.20.56.198 89.108.64.160