Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.143.8.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25665
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.143.8.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 22:18:49 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 214.8.143.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.8.143.138.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
172.96.12.121 attackspam
Automatic report - XMLRPC Attack
2019-10-05 12:15:16
77.247.110.17 attackbots
\[2019-10-04 23:57:00\] NOTICE\[1948\] chan_sip.c: Registration from '"350" \' failed for '77.247.110.17:5114' - Wrong password
\[2019-10-04 23:57:00\] SECURITY\[2006\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-04T23:57:00.384-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="350",SessionID="0x7f1e1cbe03b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.17/5114",Challenge="2dbb3155",ReceivedChallenge="2dbb3155",ReceivedHash="139cc10be3bc73b453cab5d490fabc28"
\[2019-10-04 23:57:00\] NOTICE\[1948\] chan_sip.c: Registration from '"350" \' failed for '77.247.110.17:5114' - Wrong password
\[2019-10-04 23:57:00\] SECURITY\[2006\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-04T23:57:00.495-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="350",SessionID="0x7f1e1c3aac08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.2
2019-10-05 12:08:33
144.217.15.161 attack
Oct  4 18:10:48 web9 sshd\[3465\]: Invalid user Admin@101 from 144.217.15.161
Oct  4 18:10:48 web9 sshd\[3465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.15.161
Oct  4 18:10:50 web9 sshd\[3465\]: Failed password for invalid user Admin@101 from 144.217.15.161 port 52000 ssh2
Oct  4 18:15:31 web9 sshd\[4062\]: Invalid user Admin@101 from 144.217.15.161
Oct  4 18:15:31 web9 sshd\[4062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.15.161
2019-10-05 12:23:49
197.253.6.249 attack
Oct  5 02:12:22 localhost sshd\[27354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.253.6.249  user=root
Oct  5 02:12:23 localhost sshd\[27354\]: Failed password for root from 197.253.6.249 port 55635 ssh2
Oct  5 02:16:48 localhost sshd\[27839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.253.6.249  user=root
2019-10-05 08:28:11
213.166.70.101 attackbotsspam
10/05/2019-00:01:44.256091 213.166.70.101 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-05 12:07:26
111.198.54.177 attackbotsspam
Oct  5 05:03:37 Ubuntu-1404-trusty-64-minimal sshd\[5928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.54.177  user=root
Oct  5 05:03:39 Ubuntu-1404-trusty-64-minimal sshd\[5928\]: Failed password for root from 111.198.54.177 port 54464 ssh2
Oct  5 05:53:20 Ubuntu-1404-trusty-64-minimal sshd\[13187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.54.177  user=root
Oct  5 05:53:22 Ubuntu-1404-trusty-64-minimal sshd\[13187\]: Failed password for root from 111.198.54.177 port 35482 ssh2
Oct  5 05:56:47 Ubuntu-1404-trusty-64-minimal sshd\[14113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.54.177  user=root
2019-10-05 12:18:43
120.205.45.252 attack
Automatic report - Banned IP Access
2019-10-05 12:14:30
46.166.148.210 attackbotsspam
\[2019-10-04 20:10:12\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-04T20:10:12.528-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011442837998513",SessionID="0x7f1e1c4990c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.148.210/58238",ACLName="no_extension_match"
\[2019-10-04 20:10:16\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-04T20:10:16.532-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442837998513",SessionID="0x7f1e1c02d9c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.148.210/49155",ACLName="no_extension_match"
\[2019-10-04 20:10:17\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-04T20:10:17.948-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011442837998513",SessionID="0x7f1e1c564538",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.148.210/51603",ACLName="n
2019-10-05 08:24:19
144.91.76.198 attackbots
Port scan on 6 port(s): 4113 4132 4201 4288 4294 4925
2019-10-05 08:34:15
37.187.23.116 attack
Oct  5 02:20:32 server sshd\[24222\]: Invalid user 12345zxcvb from 37.187.23.116 port 56622
Oct  5 02:20:32 server sshd\[24222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.23.116
Oct  5 02:20:34 server sshd\[24222\]: Failed password for invalid user 12345zxcvb from 37.187.23.116 port 56622 ssh2
Oct  5 02:24:29 server sshd\[1797\]: Invalid user Level@123 from 37.187.23.116 port 39158
Oct  5 02:24:29 server sshd\[1797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.23.116
2019-10-05 08:25:16
61.12.38.162 attackspam
Oct  4 17:51:40 friendsofhawaii sshd\[32053\]: Invalid user India2019 from 61.12.38.162
Oct  4 17:51:40 friendsofhawaii sshd\[32053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.12.38.162
Oct  4 17:51:41 friendsofhawaii sshd\[32053\]: Failed password for invalid user India2019 from 61.12.38.162 port 46646 ssh2
Oct  4 17:56:47 friendsofhawaii sshd\[32500\]: Invalid user 3Edc4Rfv5Tgb from 61.12.38.162
Oct  4 17:56:47 friendsofhawaii sshd\[32500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.12.38.162
2019-10-05 12:19:10
222.186.31.144 attack
Oct  5 02:30:13 localhost sshd\[29553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.144  user=root
Oct  5 02:30:16 localhost sshd\[29553\]: Failed password for root from 222.186.31.144 port 59226 ssh2
Oct  5 02:30:18 localhost sshd\[29553\]: Failed password for root from 222.186.31.144 port 59226 ssh2
2019-10-05 08:30:54
222.186.175.161 attackspam
Oct  5 07:03:10 tuotantolaitos sshd[11747]: Failed password for root from 222.186.175.161 port 37364 ssh2
Oct  5 07:03:15 tuotantolaitos sshd[11747]: Failed password for root from 222.186.175.161 port 37364 ssh2
...
2019-10-05 12:05:18
159.203.141.208 attackspam
Oct  5 09:23:39 areeb-Workstation sshd[20004]: Failed password for root from 159.203.141.208 port 55540 ssh2
...
2019-10-05 12:09:31
119.75.24.68 attackspambots
2019-10-04T21:29:14.560654abusebot.cloudsearch.cf sshd\[31584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.75.24.68  user=root
2019-10-05 08:25:02

Recently Reported IPs

125.230.155.102 186.148.208.195 141.53.34.180 36.243.239.33
236.162.65.116 93.213.132.88 43.75.221.61 103.17.162.164
226.48.55.160 158.116.174.43 189.18.116.195 212.186.181.171
236.95.175.135 150.116.230.109 175.60.167.35 52.214.114.73
65.56.142.225 136.7.212.16 139.62.9.96 51.57.6.161