Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.157.171.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58309
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.157.171.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 10:01:12 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 14.171.157.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.171.157.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
147.50.135.171 attackbotsspam
Jul  7 16:59:58 gw1 sshd[29197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.50.135.171
Jul  7 17:00:00 gw1 sshd[29197]: Failed password for invalid user ofbiz from 147.50.135.171 port 49444 ssh2
...
2020-07-08 00:11:52
27.211.212.79 attackspam
SSH auth scanning - multiple failed logins
2020-07-08 00:42:48
185.132.1.52 attackspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-07-08 00:12:40
77.48.200.117 attackbots
SSH invalid-user multiple login try
2020-07-08 00:03:00
36.155.115.95 attack
Jul  7 13:59:47 serwer sshd\[26779\]: Invalid user wang from 36.155.115.95 port 37083
Jul  7 13:59:47 serwer sshd\[26779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.115.95
Jul  7 13:59:49 serwer sshd\[26779\]: Failed password for invalid user wang from 36.155.115.95 port 37083 ssh2
...
2020-07-08 00:19:35
148.66.157.84 attackspambots
Automatic report - XMLRPC Attack
2020-07-08 00:40:37
139.199.204.61 attackbotsspam
Invalid user lj from 139.199.204.61 port 59399
2020-07-08 00:38:41
54.36.98.129 attackspam
Jul  7 17:18:42 gestao sshd[7721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.98.129 
Jul  7 17:18:45 gestao sshd[7721]: Failed password for invalid user amine from 54.36.98.129 port 55450 ssh2
Jul  7 17:21:51 gestao sshd[7749]: Failed password for root from 54.36.98.129 port 52424 ssh2
...
2020-07-08 00:28:07
91.240.118.61 attack
Jul  7 18:18:24 debian-2gb-nbg1-2 kernel: \[16397307.070891\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=91.240.118.61 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=34246 PROTO=TCP SPT=41142 DPT=3398 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-08 00:21:09
167.71.192.77 attack
Jul  7 16:12:12 plex-server sshd[541930]: Invalid user noel from 167.71.192.77 port 39982
Jul  7 16:12:12 plex-server sshd[541930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.192.77 
Jul  7 16:12:12 plex-server sshd[541930]: Invalid user noel from 167.71.192.77 port 39982
Jul  7 16:12:14 plex-server sshd[541930]: Failed password for invalid user noel from 167.71.192.77 port 39982 ssh2
Jul  7 16:15:50 plex-server sshd[542183]: Invalid user ttmsmail from 167.71.192.77 port 35924
...
2020-07-08 00:32:15
179.127.146.205 attackspambots
$f2bV_matches
2020-07-08 00:13:00
218.92.0.223 attackbots
Jul  7 17:32:26 ajax sshd[12773]: Failed password for root from 218.92.0.223 port 18107 ssh2
Jul  7 17:32:29 ajax sshd[12773]: Failed password for root from 218.92.0.223 port 18107 ssh2
2020-07-08 00:33:59
221.209.17.222 attack
SSH BruteForce Attack
2020-07-08 00:31:15
157.245.12.36 attack
Jul  7 16:51:48 nas sshd[7286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.12.36 
Jul  7 16:51:50 nas sshd[7286]: Failed password for invalid user link from 157.245.12.36 port 46004 ssh2
Jul  7 17:05:07 nas sshd[7816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.12.36 
...
2020-07-08 00:18:12
45.152.126.134 attack
Received: from [45.152.126.134] (helo=engineersedge.com) by ...
Subject: Ausziehbare Leitern
Message-ID: <111111111111111111@leiterprofis.com>
From: "Sven Franke" 
Reply-To: hutxalegnou@mailforce.net
X-SpamExperts-Class: spam
X-SpamExperts-Evidence: dnsbl/ip-02.rbl.spamrl.com
2020-07-08 00:08:24

Recently Reported IPs

189.84.223.37 57.179.63.121 232.219.86.218 122.51.243.251
122.233.219.204 213.144.135.248 141.135.209.189 43.144.73.149
38.252.140.207 27.247.128.72 79.220.88.224 85.137.90.22
47.43.8.216 133.84.139.107 217.204.52.50 232.43.91.80
178.74.106.170 211.107.214.188 59.55.101.151 21.224.19.131