Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.142.56.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3118
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.142.56.21.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 18:59:35 CST 2025
;; MSG SIZE  rcvd: 105
Host info
21.56.142.14.in-addr.arpa domain name pointer 14.142.56.21.static-Delhi.vsnl.net.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.56.142.14.in-addr.arpa	name = 14.142.56.21.static-Delhi.vsnl.net.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.49.112.2 attackspam
xmlrpc attack
2019-07-04 20:30:19
187.86.139.50 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 10:44:03,216 INFO [shellcode_manager] (187.86.139.50) no match, writing hexdump (05dd14dc7cb581684362cd0c80e6901a :2061830) - MS17010 (EternalBlue)
2019-07-04 20:09:35
176.60.208.60 attack
Absender hat Spam-Falle ausgel?st
2019-07-04 20:26:15
114.199.113.78 attack
Absender hat Spam-Falle ausgel?st
2019-07-04 20:32:31
125.99.51.58 attackspambots
Many RDP login attempts detected by IDS script
2019-07-04 20:45:45
125.138.129.101 attack
Absender hat Spam-Falle ausgel?st
2019-07-04 20:29:27
39.36.27.219 attackbots
2019-07-04 07:08:48 H=([39.36.27.219]) [39.36.27.219]:4575 I=[10.100.18.20]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=39.36.27.219)
2019-07-04 07:08:49 unexpected disconnection while reading SMTP command from ([39.36.27.219]) [39.36.27.219]:4575 I=[10.100.18.20]:25 (error: Connection reset by peer)
2019-07-04 07:46:59 H=([39.36.27.219]) [39.36.27.219]:33137 I=[10.100.18.20]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=39.36.27.219)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=39.36.27.219
2019-07-04 20:05:19
45.4.255.44 attackspambots
Absender hat Spam-Falle ausgel?st
2019-07-04 20:41:49
95.154.75.180 attackspambots
Absender hat Spam-Falle ausgel?st
2019-07-04 20:34:37
177.107.50.18 attackspam
Absender hat Spam-Falle ausgel?st
2019-07-04 20:24:51
45.118.61.10 attackbots
Absender hat Spam-Falle ausgel?st
2019-07-04 20:40:39
115.90.219.181 attackspambots
Absender hat Spam-Falle ausgel?st
2019-07-04 20:31:28
54.38.238.92 attackspam
fail2ban honeypot
2019-07-04 19:58:36
185.34.16.41 attackspam
Absender hat Spam-Falle ausgel?st
2019-07-04 20:20:57
188.166.215.46 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-07-04 20:47:13

Recently Reported IPs

246.219.94.128 13.32.115.182 201.67.104.191 27.175.222.104
147.216.48.40 44.210.233.46 223.55.80.95 50.213.102.13
6.50.240.198 42.93.93.34 99.171.169.218 96.164.88.218
30.98.106.41 253.89.237.108 133.242.189.207 103.21.113.229
123.240.162.239 113.45.79.218 213.22.226.246 16.102.67.254