Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.157.21.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15353
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.157.21.214.			IN	A

;; AUTHORITY SECTION:
.			34	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032401 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 25 11:18:15 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 214.21.157.208.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.21.157.208.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.67.75.37 attack
Feb 18 05:58:20 dedicated sshd[473]: Invalid user tammy from 114.67.75.37 port 33432
Feb 18 05:58:23 dedicated sshd[473]: Failed password for invalid user tammy from 114.67.75.37 port 33432 ssh2
Feb 18 05:58:20 dedicated sshd[473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.75.37 
Feb 18 05:58:20 dedicated sshd[473]: Invalid user tammy from 114.67.75.37 port 33432
Feb 18 05:58:23 dedicated sshd[473]: Failed password for invalid user tammy from 114.67.75.37 port 33432 ssh2
2020-02-18 13:18:16
104.236.52.94 attackspambots
Feb 18 05:55:52 sd-53420 sshd\[16182\]: Invalid user eds from 104.236.52.94
Feb 18 05:55:52 sd-53420 sshd\[16182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.52.94
Feb 18 05:55:55 sd-53420 sshd\[16182\]: Failed password for invalid user eds from 104.236.52.94 port 41140 ssh2
Feb 18 05:58:34 sd-53420 sshd\[16399\]: User bind from 104.236.52.94 not allowed because none of user's groups are listed in AllowGroups
Feb 18 05:58:34 sd-53420 sshd\[16399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.52.94  user=bind
...
2020-02-18 13:06:50
200.97.244.125 attackspam
Feb 17 23:52:56 server sshd\[24807\]: Invalid user admin from 200.97.244.125
Feb 17 23:52:57 server sshd\[24807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-97-244-125.user.veloxzone.com.br 
Feb 17 23:52:58 server sshd\[24807\]: Failed password for invalid user admin from 200.97.244.125 port 15791 ssh2
Feb 18 01:21:07 server sshd\[9077\]: Invalid user admin from 200.97.244.125
Feb 18 01:21:07 server sshd\[9077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-97-244-125.user.veloxzone.com.br 
...
2020-02-18 10:06:41
122.51.60.228 attackbotsspam
SSH Brute-Force reported by Fail2Ban
2020-02-18 13:13:33
182.16.249.130 attack
Feb 18 05:54:25 silence02 sshd[29298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.249.130
Feb 18 05:54:27 silence02 sshd[29298]: Failed password for invalid user ubuntu from 182.16.249.130 port 15696 ssh2
Feb 18 05:58:24 silence02 sshd[29481]: Failed password for root from 182.16.249.130 port 20958 ssh2
2020-02-18 13:16:14
51.75.195.222 attackspambots
Feb 18 05:58:33 mars sshd[14383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.195.222
Feb 18 05:58:35 mars sshd[14383]: Failed password for invalid user test2 from 51.75.195.222 port 39568 ssh2
...
2020-02-18 13:07:16
222.186.175.150 attack
Triggered by Fail2Ban at Ares web server
2020-02-18 13:10:57
71.139.124.243 attackspambots
SSH brute force
2020-02-18 10:12:28
114.67.103.85 attackspambots
Invalid user dvs from 114.67.103.85 port 55430
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.103.85
Failed password for invalid user dvs from 114.67.103.85 port 55430 ssh2
Invalid user fns from 114.67.103.85 port 50078
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.103.85
2020-02-18 13:04:40
111.53.40.7 attack
Port probing on unauthorized port 23
2020-02-18 10:08:07
34.92.197.196 attackbotsspam
C2,WP GET /wp-login.php
GET /blog/wp-login.php
2020-02-18 10:09:34
49.88.112.55 attackbots
Feb 18 01:45:01 hcbbdb sshd\[4462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
Feb 18 01:45:03 hcbbdb sshd\[4462\]: Failed password for root from 49.88.112.55 port 54067 ssh2
Feb 18 01:45:12 hcbbdb sshd\[4462\]: Failed password for root from 49.88.112.55 port 54067 ssh2
Feb 18 01:45:15 hcbbdb sshd\[4462\]: Failed password for root from 49.88.112.55 port 54067 ssh2
Feb 18 01:45:20 hcbbdb sshd\[4509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
2020-02-18 09:56:14
71.193.198.31 attackspambots
2019-10-09T05:18:23.448529suse-nuc sshd[4700]: Invalid user pi from 71.193.198.31 port 46562
2019-10-09T05:18:23.486298suse-nuc sshd[4702]: Invalid user pi from 71.193.198.31 port 46566
...
2020-02-18 10:06:02
113.252.19.216 attackspam
1581977322 - 02/17/2020 23:08:42 Host: 113.252.19.216/113.252.19.216 Port: 445 TCP Blocked
2020-02-18 10:01:18
80.82.77.189 attackspambots
02/17/2020-23:58:29.765527 80.82.77.189 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-18 13:12:32

Recently Reported IPs

15.206.0.203 254.54.179.130 123.68.212.132 235.236.143.23
92.33.251.181 109.139.96.127 58.244.102.154 68.107.211.216
236.135.70.173 174.144.114.234 207.209.17.249 22.106.155.202
48.7.147.203 112.158.246.134 178.107.26.29 201.163.162.49
170.252.253.247 27.168.247.106 152.253.158.30 183.114.33.196