Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.15.42.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15599
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.15.42.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121000 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 10 19:36:23 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 214.42.15.208.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.42.15.208.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.91.222.148 attackspam
Feb 26 13:44:00 motanud sshd\[32268\]: Invalid user info from 219.91.222.148 port 43422
Feb 26 13:44:00 motanud sshd\[32268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.91.222.148
Feb 26 13:44:02 motanud sshd\[32268\]: Failed password for invalid user info from 219.91.222.148 port 43422 ssh2
2019-08-11 14:25:39
211.49.241.58 attack
port scan and connect, tcp 23 (telnet)
2019-08-11 14:11:02
196.38.70.24 attack
Aug 10 21:45:57 xtremcommunity sshd\[10679\]: Invalid user user001 from 196.38.70.24 port 59679
Aug 10 21:45:57 xtremcommunity sshd\[10679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.38.70.24
Aug 10 21:45:59 xtremcommunity sshd\[10679\]: Failed password for invalid user user001 from 196.38.70.24 port 59679 ssh2
Aug 10 21:51:17 xtremcommunity sshd\[10864\]: Invalid user ww from 196.38.70.24 port 52450
Aug 10 21:51:17 xtremcommunity sshd\[10864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.38.70.24
...
2019-08-11 14:11:25
82.109.61.235 attack
SSH bruteforce (Triggered fail2ban)
2019-08-11 13:57:37
148.64.98.84 attack
firewall-block, port(s): 23/tcp
2019-08-11 14:34:52
194.199.77.78 attackbotsspam
Aug 11 06:20:13 localhost sshd\[54723\]: Invalid user justin from 194.199.77.78 port 50033
Aug 11 06:20:13 localhost sshd\[54723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.199.77.78
Aug 11 06:20:15 localhost sshd\[54723\]: Failed password for invalid user justin from 194.199.77.78 port 50033 ssh2
Aug 11 06:25:53 localhost sshd\[55028\]: Invalid user test from 194.199.77.78 port 54829
Aug 11 06:25:53 localhost sshd\[55028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.199.77.78
...
2019-08-11 14:45:14
121.121.99.83 attackbotsspam
Automatic report - Port Scan Attack
2019-08-11 14:46:15
62.210.151.21 attack
\[2019-08-11 01:44:23\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-11T01:44:23.742-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="770513054404227",SessionID="0x7ff4d0348688",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.151.21/52734",ACLName="no_extension_match"
\[2019-08-11 01:44:36\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-11T01:44:36.761-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="6669612243078499",SessionID="0x7ff4d014e018",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.151.21/55251",ACLName="no_extension_match"
\[2019-08-11 01:45:14\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-11T01:45:14.357-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="976013054404227",SessionID="0x7ff4d0348688",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.151.21/60494",ACLName="no_ex
2019-08-11 14:01:29
13.209.99.103 attack
Aug 11 06:17:27 debian sshd\[16817\]: Invalid user daina from 13.209.99.103 port 38586
Aug 11 06:17:27 debian sshd\[16817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.209.99.103
...
2019-08-11 14:08:56
137.74.213.138 attackbots
EventTime:Sun Aug 11 08:20:34 AEST 2019,Protocol:UDP,VendorEventCode:RT_FLOW_SESSION_DENY,TargetPort:53,SourceIP:137.74.213.138,SourcePort:54515
2019-08-11 14:08:21
219.92.41.112 attack
Mar  5 21:46:44 motanud sshd\[26118\]: Invalid user bernd from 219.92.41.112 port 55746
Mar  5 21:46:44 motanud sshd\[26118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.92.41.112
Mar  5 21:46:46 motanud sshd\[26118\]: Failed password for invalid user bernd from 219.92.41.112 port 55746 ssh2
2019-08-11 14:18:16
122.195.200.148 attackbots
2019-08-11T00:45:37.720960Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 122.195.200.148:15347 \(107.175.91.48:22\) \[session: d64ac62ba8fd\]
2019-08-11T06:17:51.192826Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 122.195.200.148:34021 \(107.175.91.48:22\) \[session: 7d6bbaff97ff\]
...
2019-08-11 14:27:07
221.15.199.20 attack
Aug 10 23:42:11 keyhelp sshd[10819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.15.199.20  user=r.r
Aug 10 23:42:13 keyhelp sshd[10819]: Failed password for r.r from 221.15.199.20 port 52219 ssh2
Aug 10 23:42:17 keyhelp sshd[10819]: message repeated 2 serveres: [ Failed password for r.r from 221.15.199.20 port 52219 ssh2]
Aug 10 23:42:20 keyhelp sshd[10819]: Failed password for r.r from 221.15.199.20 port 52219 ssh2
Aug 10 23:42:22 keyhelp sshd[10819]: Failed password for r.r from 221.15.199.20 port 52219 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=221.15.199.20
2019-08-11 14:07:17
209.17.97.98 attackspambots
Port scan attempt detected by AWS-CCS, CTS, India
2019-08-11 14:35:34
68.183.207.50 attackspambots
Aug 11 00:17:09 h2177944 sshd\[30590\]: Invalid user wilson from 68.183.207.50 port 53586
Aug 11 00:17:09 h2177944 sshd\[30590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.207.50
Aug 11 00:17:11 h2177944 sshd\[30590\]: Failed password for invalid user wilson from 68.183.207.50 port 53586 ssh2
Aug 11 00:21:05 h2177944 sshd\[30670\]: Invalid user no from 68.183.207.50 port 45936
...
2019-08-11 14:06:53

Recently Reported IPs

193.69.190.144 48.104.243.99 172.194.142.158 130.88.9.40
164.176.119.208 72.6.198.183 2.7.251.37 225.225.70.67
211.206.182.116 238.248.188.206 174.164.7.67 232.79.213.253
29.135.113.57 160.41.251.197 188.237.150.236 212.214.188.245
71.149.12.83 182.156.79.63 226.237.3.239 120.12.202.18