Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.105.139.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42278
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.105.139.218.		IN	A

;; AUTHORITY SECTION:
.			584	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040402 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 05 12:20:06 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 218.139.105.214.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 214.105.139.218.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
134.209.105.234 attackbotsspam
Aug  5 06:24:04 webhost01 sshd[23026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.105.234
Aug  5 06:24:05 webhost01 sshd[23026]: Failed password for invalid user penelope from 134.209.105.234 port 58944 ssh2
...
2019-08-05 07:37:21
93.87.29.86 attackbotsspam
Autoban   93.87.29.86 AUTH/CONNECT
2019-08-05 07:06:12
93.138.0.222 attackspambots
Autoban   93.138.0.222 AUTH/CONNECT
2019-08-05 07:33:15
93.39.228.188 attackspambots
Autoban   93.39.228.188 AUTH/CONNECT
2019-08-05 07:18:36
165.22.139.53 attack
Aug  4 23:16:09 * sshd[16711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.139.53
Aug  4 23:16:10 * sshd[16711]: Failed password for invalid user service from 165.22.139.53 port 45294 ssh2
2019-08-05 07:05:29
51.75.23.242 attack
Mar  1 12:13:31 motanud sshd\[10573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.23.242  user=root
Mar  1 12:13:33 motanud sshd\[10573\]: Failed password for root from 51.75.23.242 port 51590 ssh2
Mar  1 12:20:45 motanud sshd\[10990\]: Invalid user jefferson from 51.75.23.242 port 35224
Mar  1 12:20:45 motanud sshd\[10990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.23.242
2019-08-05 07:14:14
194.37.92.42 attackspambots
Aug  5 01:55:28 server sshd\[4339\]: Invalid user user3 from 194.37.92.42 port 37327
Aug  5 01:55:28 server sshd\[4339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.37.92.42
Aug  5 01:55:30 server sshd\[4339\]: Failed password for invalid user user3 from 194.37.92.42 port 37327 ssh2
Aug  5 02:00:17 server sshd\[27057\]: User root from 194.37.92.42 not allowed because listed in DenyUsers
Aug  5 02:00:17 server sshd\[27057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.37.92.42  user=root
2019-08-05 07:20:01
92.46.58.110 attack
Autoban   92.46.58.110 AUTH/CONNECT
2019-08-05 07:48:37
51.255.35.41 attackspam
SSH invalid-user multiple login attempts
2019-08-05 07:48:57
93.179.69.53 attackspambots
Autoban   93.179.69.53 AUTH/CONNECT
2019-08-05 07:27:44
93.186.96.152 attack
Autoban   93.186.96.152 AUTH/CONNECT
2019-08-05 07:25:45
93.122.248.1 attackbots
Autoban   93.122.248.1 AUTH/CONNECT
2019-08-05 07:33:44
27.254.136.29 attackspambots
Aug  4 22:44:47 MK-Soft-VM3 sshd[2466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.136.29 
Aug  4 22:44:49 MK-Soft-VM3 sshd[2466]: Failed password for invalid user alexie from 27.254.136.29 port 52738 ssh2
...
2019-08-05 07:40:33
182.162.143.236 attack
Aug  5 00:56:10 dedicated sshd[28883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.162.143.236  user=root
Aug  5 00:56:12 dedicated sshd[28883]: Failed password for root from 182.162.143.236 port 56670 ssh2
2019-08-05 07:02:48
93.44.199.104 attackbots
Autoban   93.44.199.104 AUTH/CONNECT
2019-08-05 07:11:40

Recently Reported IPs

138.32.57.164 43.13.89.201 69.157.47.144 236.5.199.83
121.251.92.208 239.2.220.209 224.125.141.17 130.83.13.198
41.101.79.52 165.124.250.67 10.215.49.96 188.209.185.209
249.244.136.132 176.19.64.2 216.165.46.25 33.217.139.93
63.133.25.13 176.240.111.71 40.44.19.83 220.65.82.83