Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.214.220.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38566
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.214.220.143.			IN	A

;; AUTHORITY SECTION:
.			309	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010601 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 07 04:01:54 CST 2022
;; MSG SIZE  rcvd: 107
Host info
143.220.214.13.in-addr.arpa domain name pointer ec2-13-214-220-143.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
143.220.214.13.in-addr.arpa	name = ec2-13-214-220-143.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.25.91.173 attackspam
1577254713 - 12/25/2019 07:18:33 Host: 125.25.91.173/125.25.91.173 Port: 445 TCP Blocked
2019-12-25 22:14:31
62.210.205.155 attackspam
no
2019-12-25 22:11:02
193.31.201.20 attackspambots
12/25/2019-12:00:11.149618 193.31.201.20 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-25 22:29:41
164.132.74.78 attackspam
2019-12-25T12:40:45.292301abusebot-5.cloudsearch.cf sshd[29858]: Invalid user joshua from 164.132.74.78 port 44200
2019-12-25T12:40:45.298779abusebot-5.cloudsearch.cf sshd[29858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip78.ip-164-132-74.eu
2019-12-25T12:40:45.292301abusebot-5.cloudsearch.cf sshd[29858]: Invalid user joshua from 164.132.74.78 port 44200
2019-12-25T12:40:47.701741abusebot-5.cloudsearch.cf sshd[29858]: Failed password for invalid user joshua from 164.132.74.78 port 44200 ssh2
2019-12-25T12:44:26.686825abusebot-5.cloudsearch.cf sshd[29866]: Invalid user hosterman from 164.132.74.78 port 42220
2019-12-25T12:44:26.696999abusebot-5.cloudsearch.cf sshd[29866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip78.ip-164-132-74.eu
2019-12-25T12:44:26.686825abusebot-5.cloudsearch.cf sshd[29866]: Invalid user hosterman from 164.132.74.78 port 42220
2019-12-25T12:44:28.440306abusebot-5.cloudse
...
2019-12-25 22:33:52
1.55.203.162 attackspam
1577265840 - 12/25/2019 10:24:00 Host: 1.55.203.162/1.55.203.162 Port: 445 TCP Blocked
2019-12-25 22:11:23
218.92.0.172 attack
Dec 25 14:26:33 marvibiene sshd[38424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172  user=root
Dec 25 14:26:34 marvibiene sshd[38424]: Failed password for root from 218.92.0.172 port 18053 ssh2
Dec 25 14:26:38 marvibiene sshd[38424]: Failed password for root from 218.92.0.172 port 18053 ssh2
Dec 25 14:26:33 marvibiene sshd[38424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172  user=root
Dec 25 14:26:34 marvibiene sshd[38424]: Failed password for root from 218.92.0.172 port 18053 ssh2
Dec 25 14:26:38 marvibiene sshd[38424]: Failed password for root from 218.92.0.172 port 18053 ssh2
...
2019-12-25 22:41:59
88.98.232.53 attackbots
Invalid user perla from 88.98.232.53 port 39165
2019-12-25 22:22:12
139.219.5.139 attack
2019-12-25T13:57:02.0335271240 sshd\[3086\]: Invalid user fi from 139.219.5.139 port 1664
2019-12-25T13:57:02.0363141240 sshd\[3086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.5.139
2019-12-25T13:57:03.8968961240 sshd\[3086\]: Failed password for invalid user fi from 139.219.5.139 port 1664 ssh2
...
2019-12-25 22:25:50
77.237.177.210 attackspam
Dec 25 07:18:52 vps647732 sshd[22998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.237.177.210
Dec 25 07:18:54 vps647732 sshd[22998]: Failed password for invalid user user from 77.237.177.210 port 15068 ssh2
...
2019-12-25 21:58:40
171.25.193.234 attackspam
Automatic report - XMLRPC Attack
2019-12-25 22:06:30
216.218.206.74 attackbotsspam
3389BruteforceFW23
2019-12-25 22:02:46
128.0.129.192 attackspam
Invalid user meldia from 128.0.129.192 port 44090
2019-12-25 22:01:29
180.140.189.40 attackbotsspam
Scanning
2019-12-25 22:40:11
171.242.8.185 attackbots
Unauthorized IMAP connection attempt
2019-12-25 22:19:45
74.208.18.153 attack
Invalid user ramlan from 74.208.18.153 port 44924
2019-12-25 22:33:21

Recently Reported IPs

121.107.149.2 47.30.150.83 215.217.27.133 70.115.6.70
50.22.8.129 19.214.125.58 162.240.134.243 216.85.93.123
136.114.33.2 69.87.231.245 205.255.25.99 209.134.47.48
4.169.34.26 215.253.238.60 136.169.166.56 204.217.42.126
151.201.46.223 231.94.213.29 159.5.92.232 2a01:598:90a0:b28e:b0b4:fbde:1aa8:7bf6