Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Houston

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.216.122.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18906
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;198.216.122.214.		IN	A

;; AUTHORITY SECTION:
.			564	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020200 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 02 16:14:27 CST 2020
;; MSG SIZE  rcvd: 119
Host info
214.122.216.198.in-addr.arpa domain name pointer dhcp216-122-214.alief.isd.tenet.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.122.216.198.in-addr.arpa	name = dhcp216-122-214.alief.isd.tenet.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
212.129.61.228 attack
212.129.61.228 - - [16/Aug/2020:15:17:52 +0100] "POST /wp-login.php HTTP/1.1" 200 2264 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.129.61.228 - - [16/Aug/2020:15:17:53 +0100] "POST /wp-login.php HTTP/1.1" 200 2229 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.129.61.228 - - [16/Aug/2020:15:17:54 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-16 22:38:14
186.103.184.227 attack
Aug 16 11:23:30 firewall sshd[1301]: Failed password for root from 186.103.184.227 port 51116 ssh2
Aug 16 11:28:27 firewall sshd[1485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.103.184.227  user=root
Aug 16 11:28:29 firewall sshd[1485]: Failed password for root from 186.103.184.227 port 32768 ssh2
...
2020-08-16 22:41:58
123.24.234.1 attackbotsspam
Unauthorised access (Aug 16) SRC=123.24.234.1 LEN=52 TTL=110 ID=3368 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-16 22:28:37
93.51.29.92 attackbots
Aug 16 16:22:45 abendstille sshd\[9800\]: Invalid user gfs from 93.51.29.92
Aug 16 16:22:45 abendstille sshd\[9800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.51.29.92
Aug 16 16:22:47 abendstille sshd\[9800\]: Failed password for invalid user gfs from 93.51.29.92 port 33716 ssh2
Aug 16 16:23:53 abendstille sshd\[11132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.51.29.92  user=stefan
Aug 16 16:23:54 abendstille sshd\[11132\]: Failed password for stefan from 93.51.29.92 port 42620 ssh2
...
2020-08-16 22:25:13
178.128.125.10 attack
2020-08-16T14:41:57.965109cyberdyne sshd[1639489]: Invalid user odoo from 178.128.125.10 port 63975
2020-08-16T14:41:57.971318cyberdyne sshd[1639489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.125.10
2020-08-16T14:41:57.965109cyberdyne sshd[1639489]: Invalid user odoo from 178.128.125.10 port 63975
2020-08-16T14:42:00.495111cyberdyne sshd[1639489]: Failed password for invalid user odoo from 178.128.125.10 port 63975 ssh2
...
2020-08-16 22:27:05
36.112.108.195 attackspambots
Aug 16 15:25:11 server sshd[18598]: Failed password for root from 36.112.108.195 port 32242 ssh2
Aug 16 15:30:01 server sshd[20790]: Failed password for invalid user scl from 36.112.108.195 port 40157 ssh2
Aug 16 15:34:49 server sshd[22987]: Failed password for invalid user git from 36.112.108.195 port 25382 ssh2
2020-08-16 22:41:26
183.136.225.44 attack
telnet attack
2020-08-16 22:49:28
103.136.40.26 attackspambots
Aug 16 14:42:42 game-panel sshd[15810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.136.40.26
Aug 16 14:42:44 game-panel sshd[15810]: Failed password for invalid user admin from 103.136.40.26 port 35286 ssh2
Aug 16 14:46:43 game-panel sshd[16006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.136.40.26
2020-08-16 22:59:03
165.227.7.5 attack
prod6
...
2020-08-16 22:55:55
138.68.238.155 attackbots
138.68.238.155 - - \[16/Aug/2020:15:52:02 +0200\] "POST /wp-login.php HTTP/1.0" 200 5615 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
138.68.238.155 - - \[16/Aug/2020:15:52:09 +0200\] "POST /wp-login.php HTTP/1.0" 200 5435 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
138.68.238.155 - - \[16/Aug/2020:15:52:12 +0200\] "POST /wp-login.php HTTP/1.0" 200 5428 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-16 22:22:21
223.71.167.163 attack
telnet attack
2020-08-16 22:48:26
49.233.77.12 attackbots
Aug 16 16:37:08 piServer sshd[7189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.77.12 
Aug 16 16:37:11 piServer sshd[7189]: Failed password for invalid user pokemon from 49.233.77.12 port 35008 ssh2
Aug 16 16:41:54 piServer sshd[7775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.77.12 
...
2020-08-16 22:53:45
51.91.116.150 attackspambots
Aug 16 15:21:31 PorscheCustomer sshd[15655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.116.150
Aug 16 15:21:33 PorscheCustomer sshd[15655]: Failed password for invalid user gbaseload from 51.91.116.150 port 54098 ssh2
Aug 16 15:31:03 PorscheCustomer sshd[16166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.116.150
...
2020-08-16 22:27:33
41.217.204.220 attackbotsspam
Aug 16 15:04:31 rancher-0 sshd[1109861]: Invalid user vnc from 41.217.204.220 port 41572
...
2020-08-16 22:45:17
107.180.92.3 attackspam
Aug 16 15:30:54 srv-ubuntu-dev3 sshd[98363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.180.92.3  user=root
Aug 16 15:30:56 srv-ubuntu-dev3 sshd[98363]: Failed password for root from 107.180.92.3 port 43444 ssh2
Aug 16 15:34:08 srv-ubuntu-dev3 sshd[98812]: Invalid user teamspeak3 from 107.180.92.3
Aug 16 15:34:08 srv-ubuntu-dev3 sshd[98812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.180.92.3
Aug 16 15:34:08 srv-ubuntu-dev3 sshd[98812]: Invalid user teamspeak3 from 107.180.92.3
Aug 16 15:34:10 srv-ubuntu-dev3 sshd[98812]: Failed password for invalid user teamspeak3 from 107.180.92.3 port 40847 ssh2
Aug 16 15:37:25 srv-ubuntu-dev3 sshd[99283]: Invalid user manu from 107.180.92.3
Aug 16 15:37:25 srv-ubuntu-dev3 sshd[99283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.180.92.3
Aug 16 15:37:25 srv-ubuntu-dev3 sshd[99283]: Invalid user manu from 1
...
2020-08-16 22:38:40

Recently Reported IPs

208.83.46.241 17.129.246.77 112.53.58.131 142.33.245.14
80.145.38.42 139.76.110.34 154.238.129.173 69.228.11.87
221.152.10.214 93.108.199.211 140.170.242.65 217.83.163.178
178.153.218.78 143.249.3.182 41.25.196.251 15.110.218.23
159.108.24.110 123.160.118.59 42.114.205.4 206.128.68.249