Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 17.214.66.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55990
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;17.214.66.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 17:07:58 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 142.66.214.17.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.66.214.17.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.68.237.12 attackspambots
2020-07-28T06:28:54.537942shield sshd\[30499\]: Invalid user clusterhack from 138.68.237.12 port 39952
2020-07-28T06:28:54.547104shield sshd\[30499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=wsddos1.preview-wsd.com
2020-07-28T06:28:56.861022shield sshd\[30499\]: Failed password for invalid user clusterhack from 138.68.237.12 port 39952 ssh2
2020-07-28T06:32:58.975959shield sshd\[31863\]: Invalid user pranava from 138.68.237.12 port 53308
2020-07-28T06:32:58.985349shield sshd\[31863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=wsddos1.preview-wsd.com
2020-07-28 14:40:17
14.187.62.157 attackbotsspam
xmlrpc attack
2020-07-28 14:43:40
5.180.220.106 attack
[2020-07-28 02:25:18] NOTICE[1248][C-00000fcc] chan_sip.c: Call from '' (5.180.220.106:58146) to extension '1111011972595725668' rejected because extension not found in context 'public'.
[2020-07-28 02:25:18] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-07-28T02:25:18.449-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1111011972595725668",SessionID="0x7f27200510e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.180.220.106/58146",ACLName="no_extension_match"
[2020-07-28 02:31:39] NOTICE[1248][C-00000fce] chan_sip.c: Call from '' (5.180.220.106:49917) to extension '11111011972595725668' rejected because extension not found in context 'public'.
[2020-07-28 02:31:39] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-07-28T02:31:39.785-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="11111011972595725668",SessionID="0x7f27200510e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",Remote
...
2020-07-28 14:35:40
50.200.213.165 attackbots
Jul 28 05:51:41 PorscheCustomer sshd[22276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.200.213.165
Jul 28 05:51:43 PorscheCustomer sshd[22276]: Failed password for invalid user fortunate from 50.200.213.165 port 5956 ssh2
Jul 28 05:55:16 PorscheCustomer sshd[22338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.200.213.165
...
2020-07-28 14:24:14
104.236.228.46 attack
Jul 28 08:07:03 web-main sshd[727415]: Invalid user ywcho from 104.236.228.46 port 36008
Jul 28 08:07:04 web-main sshd[727415]: Failed password for invalid user ywcho from 104.236.228.46 port 36008 ssh2
Jul 28 08:18:24 web-main sshd[727468]: Invalid user XiaB from 104.236.228.46 port 53912
2020-07-28 14:41:16
27.214.128.169 attackspambots
prod8
...
2020-07-28 14:20:42
5.62.63.82 attackspambots
Forbidden directory scan :: 2020/07/28 03:54:58 [error] 3005#3005: *280558 access forbidden by rule, client: 5.62.63.82, server: [censored_1], request: "GET /.git//index HTTP/1.1", host: "www.[censored_1]"
2020-07-28 14:47:20
79.124.62.203 attackbots
Jul 28 08:37:01 debian-2gb-nbg1-2 kernel: \[18176722.695050\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=79.124.62.203 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=23497 PROTO=TCP SPT=43208 DPT=2118 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-28 14:49:03
87.251.74.30 attack
Jul 28 05:25:33 XXXXXX sshd[58312]: Invalid user admin from 87.251.74.30 port 30474
2020-07-28 14:28:15
121.13.107.171 attackspambots
Jul 27 23:54:24 www sshd\[13318\]: Invalid user pi from 121.13.107.171
Jul 27 23:55:11 www sshd\[13355\]: Invalid user ubnt from 121.13.107.171
...
2020-07-28 14:22:53
181.126.83.37 attack
T: f2b ssh aggressive 3x
2020-07-28 14:38:08
79.124.61.141 attack
2020-07-28T05:54:25+02:00  exim[1065]: [1\47] 1k0Gh6-0000HB-HG H=seahorse.alhasria.com (seahorse.clovendo.com) [79.124.61.141] F= rejected after DATA: This message scored 101.6 spam points.
2020-07-28 14:41:41
202.118.8.54 attackspambots
Port Scan
...
2020-07-28 14:31:16
112.35.145.179 attackspam
Invalid user xpp from 112.35.145.179 port 33370
2020-07-28 14:36:34
113.183.162.81 attackbots
xmlrpc attack
2020-07-28 14:56:10

Recently Reported IPs

123.194.9.82 63.65.116.94 82.252.82.64 164.80.91.241
185.77.8.129 172.229.227.60 44.158.183.150 64.193.219.74
121.233.96.45 131.206.24.168 24.246.240.200 189.224.168.186
41.124.41.2 86.38.45.105 86.123.205.129 53.144.202.66
21.17.90.33 235.162.189.243 168.142.71.84 13.85.160.18