Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
8.211.42.25 attackbotsspam
Unauthorized connection attempt detected from IP address 8.211.42.25 to port 3389
2020-07-21 23:33:28
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.211.42.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13820
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.211.42.131.			IN	A

;; AUTHORITY SECTION:
.			387	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052701 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 28 03:36:30 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 131.42.211.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 131.42.211.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
120.238.130.210 attackbots
Port Scan detected
2020-08-27 17:44:36
183.89.214.156 attackspam
(imapd) Failed IMAP login from 183.89.214.156 (TH/Thailand/mx-ll-183.89.214-156.dynamic.3bb.co.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug 27 08:15:05 ir1 dovecot[3110802]: imap-login: Disconnected (auth failed, 1 attempts in 11 secs): user=, method=PLAIN, rip=183.89.214.156, lip=5.63.12.44, TLS: Connection closed, session=<9PZhwtOtRMO3Wdac>
2020-08-27 18:05:52
171.238.108.127 attackspambots
Attempted connection to port 445.
2020-08-27 17:25:46
167.0.10.65 attackspambots
Brute Force
2020-08-27 17:26:49
141.98.9.156 attack
2020-08-27T08:38:42.673007centos sshd[22231]: Invalid user guest from 141.98.9.156 port 37153
2020-08-27T08:38:42.673007centos sshd[22231]: Invalid user guest from 141.98.9.156 port 37153
2020-08-27T08:38:42.677515centos sshd[22231]: Failed none for invalid user guest from 141.98.9.156 port 37153 ssh2
...
2020-08-27 17:38:58
114.4.240.54 attackspam
Unauthorised access (Aug 27) SRC=114.4.240.54 LEN=52 TTL=115 ID=32168 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-27 18:02:12
212.83.135.137 attackspam
SIPVicious Scanner Detection
2020-08-27 17:45:36
212.33.199.69 attack
Unauthorized connection attempt detected from IP address 212.33.199.69 to port 22 [T]
2020-08-27 18:09:30
111.254.208.232 attackbotsspam
Unauthorized connection attempt from IP address 111.254.208.232 on Port 445(SMB)
2020-08-27 17:55:26
164.68.98.214 attack
Aug 24 16:47:42 nxxxxxxx sshd[17161]: refused connect from 164.68.98.214 (16=
4.68.98.214)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=164.68.98.214
2020-08-27 17:34:32
110.8.126.222 attack
Brute Force
2020-08-27 18:08:30
106.12.43.54 attackspambots
srv02 Mass scanning activity detected Target: 1920  ..
2020-08-27 18:13:11
186.159.209.163 attack
Attempted connection to port 8080.
2020-08-27 17:53:01
118.173.203.124 attack
1598501967 - 08/27/2020 06:19:27 Host: 118.173.203.124/118.173.203.124 Port: 445 TCP Blocked
2020-08-27 17:45:11
114.4.103.42 attack
Attempted connection to port 445.
2020-08-27 17:56:35

Recently Reported IPs

76.133.186.223 230.150.38.112 45.151.239.192 139.70.163.221
195.138.81.33 174.253.140.38 196.201.233.99 46.23.36.168
200.87.91.81 244.155.196.122 23.210.43.108 181.62.250.208
93.108.112.100 23.119.210.40 107.136.166.122 104.178.250.45
23.117.2.73 99.178.200.141 99.51.240.200 104.15.21.240