Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.84.214.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53096
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.84.214.122.			IN	A

;; AUTHORITY SECTION:
.			411	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123001 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 31 06:00:41 CST 2021
;; MSG SIZE  rcvd: 107
Host info
Host 122.214.84.164.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 164.84.214.122.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
42.118.219.16 attackspam
Unauthorized connection attempt detected from IP address 42.118.219.16 to port 445
2020-01-01 04:48:54
182.103.27.185 attackbots
Unauthorized connection attempt detected from IP address 182.103.27.185 to port 445
2020-01-01 04:30:29
118.68.0.249 attackspam
Unauthorized connection attempt detected from IP address 118.68.0.249 to port 23
2020-01-01 05:00:26
123.58.33.249 attackspam
Unauthorized connection attempt detected from IP address 123.58.33.249 to port 1433
2020-01-01 04:34:30
125.25.214.200 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 31-12-2019 14:55:09.
2020-01-01 04:58:25
121.199.56.253 attackspam
Unauthorized connection attempt detected from IP address 121.199.56.253 to port 445
2020-01-01 04:59:17
51.68.82.218 attackbots
SSH login attempts.
2020-01-01 05:05:54
83.146.92.194 attackspam
Unauthorized connection attempt detected from IP address 83.146.92.194 to port 445
2020-01-01 05:03:10
221.122.102.190 attack
Unauthorized connection attempt detected from IP address 221.122.102.190 to port 1433
2020-01-01 04:52:24
51.83.252.13 attack
Dec 31 20:12:26 host sshd[11501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.252.13  user=root
Dec 31 20:12:28 host sshd[11501]: Failed password for root from 51.83.252.13 port 56014 ssh2
...
2020-01-01 04:47:24
117.114.139.186 attack
Unauthorized connection attempt detected from IP address 117.114.139.186 to port 1433
2020-01-01 04:37:43
106.75.2.200 attack
Unauthorized connection attempt detected from IP address 106.75.2.200 to port 119
2020-01-01 04:43:51
119.97.217.62 attack
Unauthorized connection attempt detected from IP address 119.97.217.62 to port 1433
2020-01-01 04:37:00
182.96.50.84 attackbots
Unauthorized connection attempt detected from IP address 182.96.50.84 to port 445
2020-01-01 04:31:51
117.50.60.193 attackspam
Unauthorized connection attempt detected from IP address 117.50.60.193 to port 5007
2020-01-01 04:38:12

Recently Reported IPs

2003:de:3f1c:7d00:f959:a830:b48a:8038 236.22.234.50 82.175.226.185 195.87.99.85
24.28.147.234 165.195.250.96 64.156.212.219 121.52.252.87
171.38.10.221 179.246.114.113 24.67.116.9 68.89.214.113
95.21.141.212 174.251.177.113 114.142.48.64 31.49.40.102
47.248.230.254 171.151.237.91 47.68.29.213 85.145.215.63