Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.4.214.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30072
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;13.4.214.3.			IN	A

;; AUTHORITY SECTION:
.			471	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042601 1800 900 604800 86400

;; Query time: 144 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 27 07:48:41 CST 2020
;; MSG SIZE  rcvd: 114
Host info
Host 3.214.4.13.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 3.214.4.13.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
23.129.64.204 attackspambots
Jul 28 13:16:39 localhost sshd\[32185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.204  user=root
Jul 28 13:16:41 localhost sshd\[32185\]: Failed password for root from 23.129.64.204 port 10075 ssh2
Jul 28 13:16:44 localhost sshd\[32185\]: Failed password for root from 23.129.64.204 port 10075 ssh2
2019-07-29 04:10:34
106.75.103.35 attackspambots
ssh failed login
2019-07-29 04:25:36
165.22.50.97 attackbotsspam
28.07.2019 16:19:50 SSH access blocked by firewall
2019-07-29 04:36:44
106.39.44.11 attackbotsspam
Jul 28 22:51:10 *** sshd[23891]: Failed password for invalid user zabbix from 106.39.44.11 port 61731 ssh2
Jul 28 22:51:12 *** sshd[23893]: Failed password for invalid user zabbix from 106.39.44.11 port 61900 ssh2
2019-07-29 04:12:34
103.20.104.34 attack
Flask-IPban - exploit URL requested:/wp-login.php
2019-07-29 04:33:11
199.204.248.231 attackbotsspam
199.204.248.231 - - [28/Jul/2019:13:15:39 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
199.204.248.231 - - [28/Jul/2019:13:15:40 +0200] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
199.204.248.231 - - [28/Jul/2019:13:15:40 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
199.204.248.231 - - [28/Jul/2019:13:15:40 +0200] "POST /wp-login.php HTTP/1.1" 200 1631 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
199.204.248.231 - - [28/Jul/2019:13:15:40 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
199.204.248.231 - - [28/Jul/2019:13:15:41 +0200] "POST /wp-login.php HTTP/1.1" 200 1630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
.
2019-07-29 04:46:27
190.85.126.162 attackspam
proto=tcp  .  spt=36688  .  dpt=25  .     (listed on Blocklist de  Jul 27)     (661)
2019-07-29 04:30:55
45.124.170.1 attack
Automatic report - Port Scan Attack
2019-07-29 04:41:01
46.229.168.145 attackbotsspam
46.229.168.145 - - \[28/Jul/2019:15:25:16 +0200\] "GET /Sp%C3%A9cial:Index/Discussion:Dump/ HTTP/1.1" 200 3934 "-" "Mozilla/5.0 \(compatible\; SemrushBot/3\~bl\; +http://www.semrush.com/bot.html\)"
46.229.168.145 - - \[28/Jul/2019:15:35:41 +0200\] "GET /OMGYSU-\(version-actuelle-31\)-t-570-1.html HTTP/1.1" 200 18407 "-" "Mozilla/5.0 \(compatible\; SemrushBot/3\~bl\; +http://www.semrush.com/bot.html\)"
2019-07-29 04:21:06
176.31.100.19 attackspam
Jul 28 19:16:02 localhost sshd\[29272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.100.19  user=root
Jul 28 19:16:05 localhost sshd\[29272\]: Failed password for root from 176.31.100.19 port 36858 ssh2
...
2019-07-29 04:35:53
119.254.155.187 attack
[Aegis] @ 2019-07-28 12:15:21  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-07-29 04:53:58
218.92.0.157 attack
Jul 28 18:41:40 sshgateway sshd\[1022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.157  user=root
Jul 28 18:41:42 sshgateway sshd\[1022\]: Failed password for root from 218.92.0.157 port 26546 ssh2
Jul 28 18:41:58 sshgateway sshd\[1022\]: error: maximum authentication attempts exceeded for root from 218.92.0.157 port 26546 ssh2 \[preauth\]
2019-07-29 04:14:21
189.1.175.69 attack
proto=tcp  .  spt=53789  .  dpt=25  .     (listed on Blocklist de  Jul 27)     (656)
2019-07-29 04:40:44
122.172.27.65 attack
2019-07-28T13:08:01.890778abusebot-4.cloudsearch.cf sshd\[19410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.172.27.65  user=root
2019-07-29 04:10:11
116.99.196.215 attackspam
Unauthorised access (Jul 28) SRC=116.99.196.215 LEN=44 TTL=45 ID=61386 TCP DPT=23 WINDOW=39404 SYN
2019-07-29 04:26:09

Recently Reported IPs

102.134.112.57 186.160.31.193 81.36.110.211 97.193.171.224
31.228.175.239 113.203.164.113 185.227.110.43 45.143.220.44
5.189.161.234 73.15.254.228 203.205.37.224 180.76.238.24
180.97.204.215 113.163.216.186 59.63.224.93 180.97.204.210
2a03:b0c0:3:e0::228:5001 179.8.241.38 165.154.32.150 116.202.235.175