Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:8d8:100f:f000::214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 63561
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:8d8:100f:f000::214.	IN	A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Feb 19 00:35:42 CST 2022
;; MSG SIZE  rcvd: 52

'
Host info
4.1.2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.f.f.0.0.1.8.d.8.0.1.0.0.2.ip6.arpa domain name pointer 2001-08d8-100f-f000-0000-0000-0000-0214.elastic-ssl.ui-r.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.1.2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.f.f.0.0.1.8.d.8.0.1.0.0.2.ip6.arpa	name = 2001-08d8-100f-f000-0000-0000-0000-0214.elastic-ssl.ui-r.com.

Authoritative answers can be found from:
Related comments:
IP Type Details Datetime
201.151.216.252 attackbotsspam
Lines containing failures of 201.151.216.252
Apr  8 21:11:05 dns01 sshd[7569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.151.216.252  user=nagios
Apr  8 21:11:07 dns01 sshd[7569]: Failed password for nagios from 201.151.216.252 port 54616 ssh2
Apr  8 21:11:07 dns01 sshd[7569]: Received disconnect from 201.151.216.252 port 54616:11: Bye Bye [preauth]
Apr  8 21:11:07 dns01 sshd[7569]: Disconnected from authenticating user nagios 201.151.216.252 port 54616 [preauth]
Apr  8 21:28:46 dns01 sshd[11569]: Invalid user devops from 201.151.216.252 port 45946
Apr  8 21:28:46 dns01 sshd[11569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.151.216.252
Apr  8 21:28:48 dns01 sshd[11569]: Failed password for invalid user devops from 201.151.216.252 port 45946 ssh2
Apr  8 21:28:48 dns01 sshd[11569]: Received disconnect from 201.151.216.252 port 45946:11: Bye Bye [preauth]
Apr  8 21:28:48 dns0........
------------------------------
2020-04-10 00:21:15
187.18.175.49 attackspam
Unauthorized connection attempt from IP address 187.18.175.49 on Port 445(SMB)
2020-04-10 00:22:43
51.38.238.165 attackspam
Apr  9 17:25:06 h1745522 sshd[2584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.165  user=root
Apr  9 17:25:08 h1745522 sshd[2584]: Failed password for root from 51.38.238.165 port 38700 ssh2
Apr  9 17:25:39 h1745522 sshd[2592]: Invalid user csgoserver from 51.38.238.165 port 41566
Apr  9 17:25:39 h1745522 sshd[2592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.165
Apr  9 17:25:39 h1745522 sshd[2592]: Invalid user csgoserver from 51.38.238.165 port 41566
Apr  9 17:25:41 h1745522 sshd[2592]: Failed password for invalid user csgoserver from 51.38.238.165 port 41566 ssh2
Apr  9 17:26:07 h1745522 sshd[2598]: Invalid user abraham from 51.38.238.165 port 42872
Apr  9 17:26:07 h1745522 sshd[2598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.165
Apr  9 17:26:07 h1745522 sshd[2598]: Invalid user abraham from 51.38.238.165 port 42872
A
...
2020-04-10 00:05:52
192.145.125.114 attack
0,13-02/22 [bc00/m10] PostRequest-Spammer scoring: zurich
2020-04-10 00:21:56
162.155.147.10 attackspam
tcp 445
2020-04-09 23:32:18
202.62.224.61 attack
Apr  9 16:54:49 hosting sshd[20884]: Invalid user rdp from 202.62.224.61 port 43257
...
2020-04-10 00:06:14
171.229.77.184 attackbots
Unauthorized connection attempt from IP address 171.229.77.184 on Port 445(SMB)
2020-04-10 00:10:25
159.203.189.152 attackspambots
Apr  9 15:12:34 OPSO sshd\[13100\]: Invalid user lukas from 159.203.189.152 port 33292
Apr  9 15:12:34 OPSO sshd\[13100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.189.152
Apr  9 15:12:37 OPSO sshd\[13100\]: Failed password for invalid user lukas from 159.203.189.152 port 33292 ssh2
Apr  9 15:17:54 OPSO sshd\[14254\]: Invalid user ace from 159.203.189.152 port 42820
Apr  9 15:17:54 OPSO sshd\[14254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.189.152
2020-04-09 23:33:58
190.205.247.249 attackbots
Unauthorized connection attempt from IP address 190.205.247.249 on Port 445(SMB)
2020-04-09 23:33:12
62.210.77.54 attack
Apr  9 18:00:56 * sshd[30863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.77.54
Apr  9 18:00:58 * sshd[30863]: Failed password for invalid user \357\277\275\357\277\275\357\277\275\357\277\275\357\277\275\357\277\275 from 62.210.77.54 port 56424 ssh2
2020-04-10 00:12:21
139.59.13.53 attackspam
2020-04-09T14:57:26.214086vps751288.ovh.net sshd\[17850\]: Invalid user sai from 139.59.13.53 port 57806
2020-04-09T14:57:26.222944vps751288.ovh.net sshd\[17850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.13.53
2020-04-09T14:57:27.518649vps751288.ovh.net sshd\[17850\]: Failed password for invalid user sai from 139.59.13.53 port 57806 ssh2
2020-04-09T15:01:44.137008vps751288.ovh.net sshd\[17890\]: Invalid user guest from 139.59.13.53 port 35790
2020-04-09T15:01:44.146818vps751288.ovh.net sshd\[17890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.13.53
2020-04-10 00:14:45
77.75.78.160 attack
20 attempts against mh-misbehave-ban on wave
2020-04-09 23:41:37
116.232.71.28 attackbots
Unauthorized connection attempt from IP address 116.232.71.28 on Port 445(SMB)
2020-04-09 23:55:50
168.63.123.150 attack
Apr  9 17:52:55 server sshd[5569]: Failed password for invalid user hadoop from 168.63.123.150 port 51774 ssh2
Apr  9 17:53:43 server sshd[5762]: Failed password for invalid user teamspeak3 from 168.63.123.150 port 50256 ssh2
Apr  9 17:54:31 server sshd[5955]: Failed password for invalid user teamspeak from 168.63.123.150 port 48724 ssh2
2020-04-10 00:22:15
123.31.12.172 attack
Brute-force attempt banned
2020-04-09 23:32:45

Recently Reported IPs

2001:8d8:100f:f000::20d 2001:8d8:100f:f000::219 2001:8d8:100f:f000::21b 2001:8d8:100f:f000::21d
2001:8d8:100f:f000::221 2001:8d8:100f:f000::20e 2001:8d8:100f:f000::220 2001:8d8:100f:f000::21f
2001:8d8:100f:f000::223 2001:8d8:100f:f000::224 2001:8d8:100f:f000::222 2001:8d8:100f:f000::21e
2001:8d8:100f:f000::226 2001:8d8:100f:f000::225 2001:8d8:100f:f000::22c 2001:8d8:100f:f000::22a
2001:8d8:100f:f000::22e 2001:8d8:100f:f000::230 2001:8d8:100f:f000::22d 2001:8d8:100f:f000::231