Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.21.220.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42848
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.21.220.169.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031303 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 14 07:05:54 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 169.220.21.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.220.21.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.87.32.23 attack
Feb  4 21:20:59 grey postfix/smtpd\[25106\]: NOQUEUE: reject: RCPT from unknown\[177.87.32.23\]: 554 5.7.1 Service unavailable\; Client host \[177.87.32.23\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=177.87.32.23\; from=\ to=\ proto=ESMTP helo=\<177-87-32-23.inbnet.com.br\>
...
2020-02-05 04:35:40
151.80.254.78 attackbots
Feb  4 10:33:17 hpm sshd\[18938\]: Invalid user ftpuser from 151.80.254.78
Feb  4 10:33:17 hpm sshd\[18938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.78
Feb  4 10:33:19 hpm sshd\[18938\]: Failed password for invalid user ftpuser from 151.80.254.78 port 60122 ssh2
Feb  4 10:36:31 hpm sshd\[19220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.78  user=root
Feb  4 10:36:33 hpm sshd\[19220\]: Failed password for root from 151.80.254.78 port 33320 ssh2
2020-02-05 04:45:08
118.25.104.48 attackspambots
Feb  4 16:42:35 server sshd\[21321\]: Failed password for invalid user ire from 118.25.104.48 port 8885 ssh2
Feb  4 23:18:31 server sshd\[13993\]: Invalid user admin from 118.25.104.48
Feb  4 23:18:31 server sshd\[13993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.104.48 
Feb  4 23:18:33 server sshd\[13993\]: Failed password for invalid user admin from 118.25.104.48 port 64613 ssh2
Feb  4 23:20:49 server sshd\[14581\]: Invalid user test from 118.25.104.48
Feb  4 23:20:49 server sshd\[14581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.104.48 
...
2020-02-05 04:44:05
95.81.113.250 attack
Feb  4 15:10:39 cumulus sshd[12848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.81.113.250  user=r.r
Feb  4 15:10:41 cumulus sshd[12848]: Failed password for r.r from 95.81.113.250 port 58461 ssh2
Feb  4 15:10:43 cumulus sshd[12848]: Failed password for r.r from 95.81.113.250 port 58461 ssh2
Feb  4 15:10:46 cumulus sshd[12848]: Failed password for r.r from 95.81.113.250 port 58461 ssh2
Feb  4 15:10:49 cumulus sshd[12848]: Failed password for r.r from 95.81.113.250 port 58461 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=95.81.113.250
2020-02-05 04:51:35
200.91.225.60 attack
Honeypot attack, port: 445, PTR: 60.225.91.200.static.host.ifxnetworks.com.
2020-02-05 04:54:26
222.186.15.10 attackbots
04.02.2020 20:57:43 SSH access blocked by firewall
2020-02-05 05:03:04
46.40.47.220 attackbots
Feb  4 21:21:01 grey postfix/smtpd\[6197\]: NOQUEUE: reject: RCPT from unknown\[46.40.47.220\]: 554 5.7.1 Service unavailable\; Client host \[46.40.47.220\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?46.40.47.220\; from=\ to=\ proto=ESMTP helo=\<220-47-40-46.cpe.sattrakt.net\>
...
2020-02-05 04:33:52
122.117.179.59 attackspam
firewall-block, port(s): 23/tcp
2020-02-05 04:33:27
190.15.122.4 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-05 04:52:01
220.130.178.36 attackspam
Unauthorized connection attempt detected from IP address 220.130.178.36 to port 2220 [J]
2020-02-05 05:03:57
117.221.197.25 attackbotsspam
1580847663 - 02/04/2020 21:21:03 Host: 117.221.197.25/117.221.197.25 Port: 445 TCP Blocked
2020-02-05 04:30:01
222.186.42.75 attackspambots
Unauthorized connection attempt detected from IP address 222.186.42.75 to port 22 [J]
2020-02-05 04:58:23
69.163.224.109 attackspambots
xmlrpc attack
2020-02-05 04:55:28
122.128.131.32 attackspam
Feb  4 21:04:52 xxxx sshd[31939]: Invalid user pi from 122.128.131.32
Feb  4 21:04:52 xxxx sshd[31939]: Failed none for invalid user pi from 122.128.131.32 port 39644 ssh2
Feb  4 21:04:52 xxxx sshd[31940]: Invalid user pi from 122.128.131.32
Feb  4 21:04:52 xxxx sshd[31940]: Failed none for invalid user pi from 122.128.131.32 port 39638 ssh2
Feb  4 21:04:52 xxxx sshd[31939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.128.131.32 
Feb  4 21:04:52 xxxx sshd[31940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.128.131.32 
Feb  4 21:04:54 xxxx sshd[31939]: Failed password for invalid user pi from 122.128.131.32 port 39644 ssh2
Feb  4 21:04:54 xxxx sshd[31940]: Failed password for invalid user pi from 122.128.131.32 port 39638 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=122.128.131.32
2020-02-05 04:42:02
200.207.143.17 attackbotsspam
02/04/2020-15:20:29.615861 200.207.143.17 Protocol: 1 GPL SCAN PING NMAP
2020-02-05 05:05:24

Recently Reported IPs

215.9.99.240 128.215.160.17 122.88.222.90 143.216.178.11
223.229.30.2 42.234.50.31 45.95.99.11 84.38.92.93
156.166.18.226 179.45.66.108 174.223.22.67 172.58.55.254
177.127.113.141 241.248.194.190 205.187.247.174 203.67.158.41
97.160.171.225 85.187.77.48 75.49.245.50 245.240.202.25