Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.21.241.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18227
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.21.241.105.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:46:52 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 105.241.21.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.241.21.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.67.136.214 attack
181.67.136.214 - - [27/Aug/2020:04:40:23 +0100] "POST /xmlrpc.php HTTP/1.1" 200 229 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
181.67.136.214 - - [27/Aug/2020:04:40:28 +0100] "POST /xmlrpc.php HTTP/1.1" 200 229 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
181.67.136.214 - - [27/Aug/2020:04:40:34 +0100] "POST /xmlrpc.php HTTP/1.1" 200 229 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
...
2020-08-27 20:09:21
168.181.57.226 attackbots
168.181.57.226 - - [27/Aug/2020:04:41:20 +0100] "POST /xmlrpc.php HTTP/1.1" 200 229 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
168.181.57.226 - - [27/Aug/2020:04:41:23 +0100] "POST /xmlrpc.php HTTP/1.1" 200 229 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
168.181.57.226 - - [27/Aug/2020:04:41:29 +0100] "POST /xmlrpc.php HTTP/1.1" 200 229 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
...
2020-08-27 19:52:01
186.233.178.46 attackbotsspam
Tried our host z.
2020-08-27 19:53:22
14.246.31.181 attackbotsspam
Fail2Ban Ban Triggered
2020-08-27 19:59:33
188.53.2.59 attack
Port probing on unauthorized port 445
2020-08-27 20:27:30
118.70.233.6 attack
firewall-block, port(s): 445/tcp
2020-08-27 20:18:35
195.54.167.174 attackspam
Port scan: Attack repeated for 24 hours
2020-08-27 20:25:19
81.198.119.241 attackspambots
Dovecot Invalid User Login Attempt.
2020-08-27 19:51:20
159.65.65.54 attackbots
Aug 27 05:36:00 xeon sshd[37167]: Failed password for invalid user project from 159.65.65.54 port 38092 ssh2
2020-08-27 20:19:55
103.254.56.157 attackbots
IP 103.254.56.157 attacked honeypot on port: 5000 at 8/26/2020 8:41:49 PM
2020-08-27 19:45:40
180.104.92.183 attack
Email rejected due to spam filtering
2020-08-27 20:05:35
103.114.107.129 attackspambots
 TCP (SYN) 103.114.107.129:56685 -> port 3389, len 44
2020-08-27 20:15:33
192.241.236.76 attackspambots
515/tcp 5222/tcp 139/tcp
[2020-08-25/26]3pkt
2020-08-27 20:02:13
183.166.59.11 attackspam
Brute Force
2020-08-27 20:00:03
178.46.212.28 attack
Unauthorised access (Aug 27) SRC=178.46.212.28 LEN=40 TTL=52 ID=30472 TCP DPT=23 WINDOW=56959 SYN
2020-08-27 19:50:56

Recently Reported IPs

14.21.242.238 14.21.242.252 14.21.242.4 14.21.242.144
14.21.242.18 14.21.242.250 14.21.242.60 14.21.243.134
14.21.243.129 14.21.243.186 14.21.242.231 14.21.243.196
14.21.243.226 14.21.243.212 14.21.243.35 14.21.243.4
14.21.34.83 14.21.255.125 14.21.29.206 14.21.44.122