Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.145.217.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9554
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.145.217.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:41:24 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 40.217.145.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.217.145.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.49.231.168 attack
firewall-block, port(s): 5038/tcp
2020-01-17 01:39:50
222.186.175.202 attack
Jan 16 18:35:04 MK-Soft-VM8 sshd[12729]: Failed password for root from 222.186.175.202 port 12404 ssh2
Jan 16 18:35:07 MK-Soft-VM8 sshd[12729]: Failed password for root from 222.186.175.202 port 12404 ssh2
...
2020-01-17 01:36:19
93.235.96.85 attackspambots
Port 22 Scan, PTR: None
2020-01-17 01:35:16
41.251.231.76 attackspambots
SSH_scan
2020-01-17 02:03:17
190.129.76.2 attackbots
Unauthorized connection attempt from IP address 190.129.76.2 on Port 445(SMB)
2020-01-17 01:38:59
60.168.172.72 attackbots
SMTP nagging
2020-01-17 01:48:44
168.245.123.156 attackspambots
Absolute nuisance spam about trading... very pushy with several messages sent per day... totally unsolicited... such presentations are not to be trusted when portrayed in this manner. This suspect content is being sent from domain of @m.dripemail2.com designates 168.245.123.156 as permitted sender.
2020-01-17 01:34:04
193.112.72.126 attackspambots
ssh intrusion attempt
2020-01-17 01:40:17
77.242.20.190 attack
Unauthorized connection attempt detected from IP address 77.242.20.190 to port 1433 [J]
2020-01-17 01:45:13
144.217.80.80 attackbots
$f2bV_matches
2020-01-17 01:54:18
223.242.228.192 attackspam
Spammer
2020-01-17 01:49:12
200.109.208.152 attackbotsspam
Unauthorized connection attempt from IP address 200.109.208.152 on Port 445(SMB)
2020-01-17 01:38:02
122.226.119.138 attack
Unauthorized connection attempt from IP address 122.226.119.138 on Port 445(SMB)
2020-01-17 01:25:56
139.199.204.61 attackbotsspam
Unauthorized connection attempt detected from IP address 139.199.204.61 to port 2220 [J]
2020-01-17 01:42:08
124.254.1.234 attackbotsspam
"SSH brute force auth login attempt."
2020-01-17 01:47:54

Recently Reported IPs

16.37.194.91 229.114.196.247 73.180.197.195 43.131.144.118
237.41.97.148 54.192.217.222 203.167.28.251 137.174.70.214
209.145.242.157 240.117.177.67 49.106.178.134 230.34.249.93
83.211.166.21 77.17.37.112 124.198.240.229 74.177.73.81
114.90.93.226 113.40.196.200 14.112.110.138 28.132.189.148