Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.221.66.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29890
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.221.66.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025051801 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 19 12:32:28 CST 2025
;; MSG SIZE  rcvd: 106
Host info
214.66.221.13.in-addr.arpa domain name pointer ec2-13-221-66-214.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.66.221.13.in-addr.arpa	name = ec2-13-221-66-214.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.33.12.237 attackspam
Invalid user ark from 178.33.12.237 port 55240
2020-06-28 06:00:34
165.73.90.182 attackspambots
WordPress brute force
2020-06-28 06:13:30
52.230.7.48 attack
2020-06-27T15:35:46.007168linuxbox-skyline sshd[288624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.230.7.48  user=root
2020-06-27T15:35:48.323885linuxbox-skyline sshd[288624]: Failed password for root from 52.230.7.48 port 4038 ssh2
...
2020-06-28 05:56:28
186.106.189.67 attackspam
WordPress brute force
2020-06-28 06:04:42
187.189.61.7 attack
Attempted connection to port 32262.
2020-06-28 06:27:32
182.185.123.129 attack
WordPress brute force
2020-06-28 06:08:10
191.179.26.42 attackspambots
WordPress brute force
2020-06-28 06:00:01
185.100.44.233 attackspam
SMB Server BruteForce Attack
2020-06-28 06:12:00
178.116.22.137 attackbotsspam
WordPress brute force
2020-06-28 06:12:29
190.147.192.113 attackspambots
Attempted connection to port 26.
2020-06-28 06:23:54
46.105.29.160 attackspam
1287. On Jun 27 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 46.105.29.160.
2020-06-28 06:07:16
47.17.177.110 attackspambots
SSH Invalid Login
2020-06-28 05:56:43
119.28.42.171 attackspam
SSH Invalid Login
2020-06-28 05:58:13
119.70.82.96 attackbotsspam
WordPress brute force
2020-06-28 06:32:06
192.140.149.211 attackspam
WordPress brute force
2020-06-28 05:57:52

Recently Reported IPs

124.131.155.107 27.81.32.95 104.254.211.108 10.10.204.191
41.207.70.10 15.127.188.132 75.51.58.15 78.141.233.162
6.249.32.40 215.54.166.224 10.11.7.189 10.180.250.235
45.87.70.40 198.235.24.51 10.11.156.119 80.94.95.95
104.28.156.67 234.58.223.105 27.254.219.102 165.165.57.90