Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.120.205.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54870
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.120.205.55.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 05:36:33 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 55.205.120.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 214.120.205.55.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
195.228.148.10 attack
Aug 22 09:27:21 host sshd[8947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mllnc3e4940a.fixip.t-online.hu  user=root
Aug 22 09:27:23 host sshd[8947]: Failed password for root from 195.228.148.10 port 52030 ssh2
...
2020-08-22 18:27:57
106.52.200.86 attackbotsspam
Aug 22 10:14:13 plex-server sshd[1460901]: Invalid user terrariaserver from 106.52.200.86 port 51964
Aug 22 10:14:15 plex-server sshd[1460901]: Failed password for invalid user terrariaserver from 106.52.200.86 port 51964 ssh2
Aug 22 10:17:12 plex-server sshd[1462627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.200.86  user=root
Aug 22 10:17:14 plex-server sshd[1462627]: Failed password for root from 106.52.200.86 port 55006 ssh2
Aug 22 10:20:12 plex-server sshd[1464354]: Invalid user git from 106.52.200.86 port 58050
...
2020-08-22 18:33:13
178.62.243.59 attackspam
29 attempts against mh-misbehave-ban on train
2020-08-22 18:02:46
92.118.160.61 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-08-22 17:58:50
181.94.226.140 attack
sshd: Failed password for invalid user .... from 181.94.226.140 port 25483 ssh2 (8 attempts)
2020-08-22 17:54:30
110.225.82.70 attack
2020-08-21 22:34:16.762770-0500  localhost smtpd[59946]: NOQUEUE: reject: RCPT from unknown[110.225.82.70]: 554 5.7.1 Service unavailable; Client host [110.225.82.70] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/110.225.82.70; from= to= proto=ESMTP helo=<[110.225.82.70]>
2020-08-22 18:00:51
14.143.131.186 attackbotsspam
Attempted connection to port 445.
2020-08-22 18:20:44
157.245.245.159 attackbots
157.245.245.159 - - \[22/Aug/2020:10:35:52 +0200\] "POST /wp-login.php HTTP/1.0" 200 8727 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
157.245.245.159 - - \[22/Aug/2020:10:35:54 +0200\] "POST /wp-login.php HTTP/1.0" 200 8729 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
157.245.245.159 - - \[22/Aug/2020:10:36:00 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 935 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-22 17:54:15
51.38.65.208 attackspambots
Aug 22 10:05:54 cosmoit sshd[25807]: Failed password for root from 51.38.65.208 port 57430 ssh2
2020-08-22 18:31:49
222.186.175.167 attackbotsspam
Aug 22 12:11:55 santamaria sshd\[3204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
Aug 22 12:11:56 santamaria sshd\[3204\]: Failed password for root from 222.186.175.167 port 25342 ssh2
Aug 22 12:12:13 santamaria sshd\[3206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
...
2020-08-22 18:15:00
152.136.98.80 attackspam
Aug 22 11:47:22 ns382633 sshd\[9549\]: Invalid user babu from 152.136.98.80 port 56896
Aug 22 11:47:22 ns382633 sshd\[9549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.98.80
Aug 22 11:47:24 ns382633 sshd\[9549\]: Failed password for invalid user babu from 152.136.98.80 port 56896 ssh2
Aug 22 11:59:15 ns382633 sshd\[11974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.98.80  user=root
Aug 22 11:59:17 ns382633 sshd\[11974\]: Failed password for root from 152.136.98.80 port 55518 ssh2
2020-08-22 18:30:32
190.79.66.24 attackspambots
Attempted connection to port 445.
2020-08-22 18:15:26
110.187.34.112 attack
Attempted connection to port 1433.
2020-08-22 18:21:49
103.95.97.186 attackbotsspam
xmlrpc attack
2020-08-22 17:57:52
113.200.156.180 attackspambots
Invalid user mongodb from 113.200.156.180 port 43278
2020-08-22 18:30:57

Recently Reported IPs

17.203.137.221 238.104.166.183 117.56.185.117 86.7.3.198
197.201.12.17 75.75.239.213 21.227.158.171 230.87.187.7
17.89.211.106 236.17.41.206 131.245.233.47 252.86.155.133
27.66.249.58 196.157.26.86 245.64.42.9 181.231.126.132
35.7.157.86 163.244.144.124 20.23.214.228 152.121.211.37