Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.20.14.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1881
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;100.20.14.222.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 22:45:46 CST 2025
;; MSG SIZE  rcvd: 106
Host info
222.14.20.100.in-addr.arpa domain name pointer ec2-100-20-14-222.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
222.14.20.100.in-addr.arpa	name = ec2-100-20-14-222.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
179.157.8.166 attackbotsspam
Aug  2 05:40:36 nextcloud sshd\[5776\]: Invalid user magento from 179.157.8.166
Aug  2 05:40:36 nextcloud sshd\[5776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.157.8.166
Aug  2 05:40:38 nextcloud sshd\[5776\]: Failed password for invalid user magento from 179.157.8.166 port 36482 ssh2
...
2019-08-02 11:52:32
75.82.56.12 attackspam
Automatic report - Port Scan Attack
2019-08-02 11:28:41
186.192.163.26 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-08-02 11:57:06
116.32.206.209 attackspambots
k+ssh-bruteforce
2019-08-02 11:53:44
109.117.248.204 attackbots
23/tcp
[2019-08-02]1pkt
2019-08-02 12:28:25
173.248.226.64 attack
firewall-block, port(s): 445/tcp
2019-08-02 11:42:39
220.178.49.234 attackbotsspam
$f2bV_matches
2019-08-02 11:35:08
107.170.201.213 attackspambots
5903/tcp 51465/tcp 135/tcp...
[2019-06-01/07-31]65pkt,53pt.(tcp),4pt.(udp)
2019-08-02 12:26:20
180.250.111.17 attack
Aug  2 03:17:30 mout sshd[12951]: Invalid user fv from 180.250.111.17 port 41535
Aug  2 03:17:31 mout sshd[12951]: Failed password for invalid user fv from 180.250.111.17 port 41535 ssh2
Aug  2 03:17:31 mout sshd[12951]: Connection closed by 180.250.111.17 port 41535 [preauth]
2019-08-02 11:57:39
92.118.38.34 attackspambots
Jul 30 22:16:45 nirvana postfix/smtpd[10193]: warning: hostname ip-38-34.ZervDNS does not resolve to address 92.118.38.34: Name or service not known
Jul 30 22:16:45 nirvana postfix/smtpd[10193]: connect from unknown[92.118.38.34]
Jul 30 22:16:46 nirvana postfix/smtpd[10857]: warning: hostname ip-38-34.ZervDNS does not resolve to address 92.118.38.34: Name or service not known
Jul 30 22:16:46 nirvana postfix/smtpd[10857]: connect from unknown[92.118.38.34]
Jul 30 22:16:47 nirvana postfix/smtpd[10860]: warning: hostname ip-38-34.ZervDNS does not resolve to address 92.118.38.34: Name or service not known
Jul 30 22:16:47 nirvana postfix/smtpd[10860]: connect from unknown[92.118.38.34]
Jul 30 22:16:51 nirvana postfix/smtpd[10857]: warning: unknown[92.118.38.34]: SASL LOGIN authentication failed: authentication failure
Jul 30 22:16:51 nirvana postfix/smtpd[10860]: warning: unknown[92.118.38.34]: SASL LOGIN authentication failed: authentication failure
Jul 30 22:16:51 nirvana ........
-------------------------------
2019-08-02 11:44:02
61.162.24.88 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-02 11:56:02
77.40.62.152 attack
[Aegis] @ 2019-08-02 02:22:17  0100 -> Attempt to use mail server as relay (550: Requested action not taken).
2019-08-02 11:40:30
201.171.84.78 attackbots
firewall-block, port(s): 445/tcp
2019-08-02 11:38:01
201.33.41.125 attackspambots
SMTP-sasl brute force
...
2019-08-02 12:32:11
89.78.18.113 attackspambots
firewall-block, port(s): 5555/tcp
2019-08-02 11:46:04

Recently Reported IPs

72.139.178.146 205.176.83.253 61.25.228.100 228.38.188.223
86.10.219.252 235.130.87.63 229.125.195.97 22.246.163.153
18.203.128.232 19.37.59.105 78.6.77.176 177.149.78.124
65.238.33.242 195.14.169.92 36.205.248.189 214.1.92.181
227.157.249.237 26.85.180.149 162.169.39.129 167.79.58.248