Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Piscataway

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.168.221.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43111
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.168.221.14.			IN	A

;; AUTHORITY SECTION:
.			290	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022071400 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 14 17:20:48 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 14.221.168.144.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.221.168.144.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.205.92.46 attackspambots
Autoban   185.205.92.46 AUTH/CONNECT
2019-06-25 09:14:09
77.247.108.113 attack
24.06.2019 22:54:40 Connection to port 5060 blocked by firewall
2019-06-25 08:40:28
185.192.103.44 attack
Autoban   185.192.103.44 AUTH/CONNECT
2019-06-25 09:19:44
185.222.209.99 attackbots
Autoban   185.222.209.99 AUTH/CONNECT
2019-06-25 09:06:55
222.255.115.123 attackbots
Looking for resource vulnerabilities
2019-06-25 09:09:51
121.40.128.99 attackspambots
Jun 24 22:59:51 localhost sshd\[466\]: Invalid user ts3musicbot from 121.40.128.99 port 27011
Jun 24 22:59:51 localhost sshd\[466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.40.128.99
Jun 24 22:59:54 localhost sshd\[466\]: Failed password for invalid user ts3musicbot from 121.40.128.99 port 27011 ssh2
Jun 24 23:04:06 localhost sshd\[577\]: Invalid user mei from 121.40.128.99 port 40459
2019-06-25 09:03:18
185.51.92.108 attack
Autoban   185.51.92.108 AUTH/CONNECT
2019-06-25 08:46:35
185.65.252.66 attackspambots
Autoban   185.65.252.66 AUTH/CONNECT
2019-06-25 08:41:02
52.158.25.226 attackspam
Automatic report - Web App Attack
2019-06-25 09:07:27
185.37.27.91 attack
Autoban   185.37.27.91 AUTH/CONNECT
2019-06-25 08:47:32
185.244.25.107 attackbotsspam
scan z
2019-06-25 09:19:16
185.95.204.19 attackspambots
Autoban   185.95.204.19 AUTH/CONNECT
2019-06-25 08:35:52
185.50.185.102 attack
Autoban   185.50.185.102 AUTH/CONNECT
2019-06-25 08:47:10
193.109.144.20 attackspambots
Jun 25 00:04:15 nextcloud sshd\[18040\]: Invalid user admin from 193.109.144.20
Jun 25 00:04:15 nextcloud sshd\[18040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.109.144.20
Jun 25 00:04:17 nextcloud sshd\[18040\]: Failed password for invalid user admin from 193.109.144.20 port 49286 ssh2
...
2019-06-25 08:50:31
118.24.119.135 attackbotsspam
Detected by ModSecurity. Request URI: /wp-login.php
2019-06-25 09:06:39

Recently Reported IPs

188.75.67.74 176.9.234.97 45.153.240.246 137.184.233.197
248.65.109.245 207.16.231.106 5.189.223.200 206.189.88.57
45.32.223.100 22.132.101.72 103.153.130.222 103.153.130.123
185.63.153.34 67.198.184.82 67.229.35.162 98.126.200.26
100.43.154.10 67.226.35.162 51.38.145.170 212.32.207.64