Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.224.214.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58537
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.224.214.22.			IN	A

;; AUTHORITY SECTION:
.			518	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 04:56:23 CST 2022
;; MSG SIZE  rcvd: 106
Host info
22.214.224.13.in-addr.arpa domain name pointer server-13-224-214-22.phl50.r.cloudfront.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.214.224.13.in-addr.arpa	name = server-13-224-214-22.phl50.r.cloudfront.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.173 attackbots
May 20 22:50:30 * sshd[25681]: Failed password for root from 218.92.0.173 port 29523 ssh2
May 20 22:50:43 * sshd[25681]: error: maximum authentication attempts exceeded for root from 218.92.0.173 port 29523 ssh2 [preauth]
2020-05-21 05:10:11
190.143.39.211 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-05-21 04:41:26
106.54.139.117 attack
Failed password for root from 106.54.139.117 port 42670 ssh2
2020-05-21 04:36:49
162.243.145.65 attackbots
Automatic report - Port Scan Attack
2020-05-21 05:04:18
187.188.83.115 attack
2020-05-20T17:52:35.749263shield sshd\[28826\]: Invalid user hcy from 187.188.83.115 port 21810
2020-05-20T17:52:35.752990shield sshd\[28826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-188-83-115.totalplay.net
2020-05-20T17:52:38.350966shield sshd\[28826\]: Failed password for invalid user hcy from 187.188.83.115 port 21810 ssh2
2020-05-20T17:56:22.055438shield sshd\[29792\]: Invalid user trj from 187.188.83.115 port 21615
2020-05-20T17:56:22.059610shield sshd\[29792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-188-83-115.totalplay.net
2020-05-21 04:42:11
71.45.233.98 attack
May 20 20:15:22 game-panel sshd[4259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.45.233.98
May 20 20:15:24 game-panel sshd[4259]: Failed password for invalid user cdph from 71.45.233.98 port 49528 ssh2
May 20 20:20:06 game-panel sshd[4446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.45.233.98
2020-05-21 04:58:34
66.131.216.79 attack
May 19 18:14:24 sip sshd[10367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.131.216.79
May 19 18:14:26 sip sshd[10367]: Failed password for invalid user olk from 66.131.216.79 port 60578 ssh2
May 19 18:24:28 sip sshd[14056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.131.216.79
2020-05-21 04:57:26
123.207.178.45 attack
May 20 22:46:46 piServer sshd[6653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.178.45 
May 20 22:46:48 piServer sshd[6653]: Failed password for invalid user kzv from 123.207.178.45 port 15984 ssh2
May 20 22:50:33 piServer sshd[7024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.178.45 
...
2020-05-21 04:51:02
112.85.42.232 attackbotsspam
May 20 22:46:48 home sshd[5583]: Failed password for root from 112.85.42.232 port 31098 ssh2
May 20 22:48:05 home sshd[5776]: Failed password for root from 112.85.42.232 port 32502 ssh2
May 20 22:48:08 home sshd[5776]: Failed password for root from 112.85.42.232 port 32502 ssh2
...
2020-05-21 05:00:11
220.253.25.190 attackbotsspam
May 19 05:18:02 josie sshd[20508]: Invalid user arx from 220.253.25.190
May 19 05:18:02 josie sshd[20508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.253.25.190 
May 19 05:18:04 josie sshd[20508]: Failed password for invalid user arx from 220.253.25.190 port 36562 ssh2
May 19 05:18:04 josie sshd[20509]: Received disconnect from 220.253.25.190: 11: Bye Bye
May 19 05:22:51 josie sshd[21325]: Invalid user yll from 220.253.25.190
May 19 05:22:51 josie sshd[21325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.253.25.190 
May 19 05:22:54 josie sshd[21325]: Failed password for invalid user yll from 220.253.25.190 port 45788 ssh2
May 19 05:22:54 josie sshd[21326]: Received disconnect from 220.253.25.190: 11: Bye Bye
May 19 05:27:33 josie sshd[21928]: Invalid user ajv from 220.253.25.190
May 19 05:27:33 josie sshd[21928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui........
-------------------------------
2020-05-21 04:45:53
212.58.120.198 attackspam
May 20 15:51:25 XXX sshd[9241]: Invalid user avanthi from 212.58.120.198 port 32982
2020-05-21 04:54:45
101.231.154.154 attackspam
May 15 22:53:12 prox sshd[23744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.154.154 
May 15 22:53:15 prox sshd[23744]: Failed password for invalid user admin from 101.231.154.154 port 7735 ssh2
2020-05-21 05:06:15
168.205.133.65 attackspam
Port 22 Scan, PTR: None
2020-05-21 05:07:15
193.112.156.178 attack
May 20 11:52:33 Host-KLAX-C sshd[6239]: Invalid user rok from 193.112.156.178 port 56346
...
2020-05-21 04:55:00
94.102.51.58 attack
May 20 21:43:47 debian-2gb-nbg1-2 kernel: \[12262652.653154\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.51.58 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=27814 PROTO=TCP SPT=45989 DPT=3275 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-21 04:33:30

Recently Reported IPs

13.224.214.17 13.224.214.29 118.172.107.22 13.224.214.31
13.224.214.32 13.224.214.34 118.172.107.221 13.224.214.36
13.224.214.39 13.224.214.48 13.224.214.60 13.224.214.63
118.172.107.227 13.224.214.67 13.224.214.88 13.224.214.92
13.224.214.76 13.224.214.9 13.224.214.94 13.224.218.105