Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nagykanizsa

Region: Zala

Country: Hungary

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 84.0.132.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53325
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;84.0.132.114.			IN	A

;; AUTHORITY SECTION:
.			369	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111601 1800 900 604800 86400

;; Query time: 175 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 17 03:43:00 CST 2019
;; MSG SIZE  rcvd: 116
Host info
114.132.0.84.in-addr.arpa domain name pointer 54008472.dsl.pool.telekom.hu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.132.0.84.in-addr.arpa	name = 54008472.dsl.pool.telekom.hu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.196.167.187 attackbots
 TCP (SYN) 112.196.167.187:52362 -> port 445, len 52
2020-08-13 01:59:43
77.79.95.202 attackbotsspam
 TCP (SYN) 77.79.95.202:3654 -> port 7547, len 40
2020-08-13 02:04:55
80.82.65.213 attack
IPS Sensor Hit - Port Scan detected
2020-08-13 02:27:55
182.119.8.175 attackbots
 TCP (SYN) 182.119.8.175:28564 -> port 23, len 44
2020-08-13 02:15:51
172.104.112.244 attackbots
 TCP (SYN) 172.104.112.244:51430 -> port 1080, len 40
2020-08-13 02:18:11
171.252.155.124 attackbotsspam
 TCP (SYN) 171.252.155.124:9155 -> port 445, len 52
2020-08-13 02:18:43
194.31.141.58 attack
 TCP (SYN) 194.31.141.58:49109 -> port 445, len 40
2020-08-13 02:13:11
139.220.192.57 attack
 TCP (SYN) 139.220.192.57:10792 -> port 22, len 48
2020-08-13 01:55:33
149.129.135.127 attackspam
 TCP (SYN) 149.129.135.127:32650 -> port 80, len 44
2020-08-13 02:19:44
216.218.206.100 attack
 TCP (SYN) 216.218.206.100:36725 -> port 3389, len 44
2020-08-13 01:50:23
77.79.172.86 attackspambots
 TCP (SYN) 77.79.172.86:39053 -> port 7547, len 40
2020-08-13 02:03:05
218.161.111.228 attack
 TCP (SYN) 218.161.111.228:25313 -> port 80, len 40
2020-08-13 01:50:07
77.79.151.156 attackbots
 TCP (SYN) 77.79.151.156:43382 -> port 7547, len 40
2020-08-13 02:03:52
171.38.216.72 attack
 TCP (SYN) 171.38.216.72:54912 -> port 23, len 44
2020-08-13 02:19:16
182.71.53.150 attackbots
 TCP (SYN) 182.71.53.150:51212 -> port 445, len 52
2020-08-13 02:16:20

Recently Reported IPs

113.172.115.103 67.137.72.76 12.27.2.66 1.52.172.213
49.126.154.241 61.144.37.14 195.207.24.185 116.32.178.12
119.181.251.47 73.255.221.190 207.190.245.191 197.11.92.150
190.121.125.95 117.25.86.201 24.167.41.9 173.199.105.100
162.240.206.194 207.248.217.5 151.177.33.170 93.239.14.216