Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.111.8.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9039
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.111.8.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 20:42:33 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 214.8.111.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 214.111.8.214.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
186.179.155.172 attackbotsspam
Invalid user admin from 186.179.155.172 port 47445
2020-01-19 21:12:32
180.76.54.158 attack
Invalid user inma from 180.76.54.158 port 51412
2020-01-19 21:26:36
177.34.125.113 attackspam
Invalid user wei from 177.34.125.113 port 60815
2020-01-19 21:27:28
139.155.45.196 attackspam
2020-01-19T12:55:07.645279shield sshd\[17686\]: Invalid user konrad from 139.155.45.196 port 53744
2020-01-19T12:55:07.650201shield sshd\[17686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.45.196
2020-01-19T12:55:09.767433shield sshd\[17686\]: Failed password for invalid user konrad from 139.155.45.196 port 53744 ssh2
2020-01-19T12:59:16.560061shield sshd\[19799\]: Invalid user vds from 139.155.45.196 port 47384
2020-01-19T12:59:16.564478shield sshd\[19799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.45.196
2020-01-19 21:02:58
106.12.200.14 attackspambots
SSHD brute force attack detected by fail2ban
2020-01-19 21:05:46
222.180.162.8 attackbotsspam
Unauthorized connection attempt detected from IP address 222.180.162.8 to port 2220 [J]
2020-01-19 21:22:01
14.177.131.24 attackbotsspam
Invalid user admin from 14.177.131.24 port 36580
2020-01-19 21:20:40
115.231.73.154 attack
Invalid user postgres from 115.231.73.154 port 58646
2020-01-19 21:33:47
193.70.38.80 attackspam
Invalid user plotter from 193.70.38.80 port 40208
2020-01-19 21:23:46
87.110.38.78 attackbotsspam
Fail2Ban Ban Triggered
2020-01-19 21:10:11
206.189.166.172 attack
Invalid user postgres from 206.189.166.172 port 52598
2020-01-19 21:22:43
223.214.28.122 attackbots
2020-01-19 06:58:57 H=(mepe) [223.214.28.122]:58514 I=[192.147.25.65]:25 F= rejected RCPT <2565960170@qq.com>: RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.11) (https://www.spamhaus.org/query/ip/223.214.28.122)
2020-01-19 06:59:09 dovecot_login authenticator failed for (vcsrcc) [223.214.28.122]:58601 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
2020-01-19 06:59:18 dovecot_login authenticator failed for (lnvpv) [223.214.28.122]:59256 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
...
2020-01-19 21:02:22
118.89.31.153 attack
Invalid user gin from 118.89.31.153 port 37470
2020-01-19 21:32:49
209.141.46.240 attack
Jan 19 13:56:54 localhost sshd\[4044\]: Invalid user sarah from 209.141.46.240
Jan 19 13:56:54 localhost sshd\[4044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.46.240
Jan 19 13:56:56 localhost sshd\[4044\]: Failed password for invalid user sarah from 209.141.46.240 port 33824 ssh2
Jan 19 13:59:05 localhost sshd\[4091\]: Invalid user ta from 209.141.46.240
Jan 19 13:59:05 localhost sshd\[4091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.46.240
...
2020-01-19 21:09:06
180.76.234.141 attack
Automatic report - XMLRPC Attack
2020-01-19 21:00:08

Recently Reported IPs

75.70.176.147 106.207.21.236 40.248.46.214 145.108.100.246
163.119.144.19 154.164.24.145 47.36.194.6 36.222.77.170
80.202.41.48 91.80.31.62 224.192.41.165 101.118.224.94
39.93.128.182 89.240.245.57 243.153.222.249 208.199.22.186
106.30.16.32 180.167.16.155 149.182.175.57 58.198.178.129