Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.120.55.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47747
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.120.55.89.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 08:58:11 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 89.55.120.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 214.120.55.89.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
138.197.213.233 attack
(sshd) Failed SSH login from 138.197.213.233 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  3 18:06:22 ubnt-55d23 sshd[8938]: Invalid user wangzhiyong from 138.197.213.233 port 42008
Apr  3 18:06:24 ubnt-55d23 sshd[8938]: Failed password for invalid user wangzhiyong from 138.197.213.233 port 42008 ssh2
2020-04-04 03:42:32
124.156.121.169 attackbots
5x Failed Password
2020-04-04 03:46:55
175.211.105.99 attackbotsspam
(sshd) Failed SSH login from 175.211.105.99 (KR/South Korea/-): 5 in the last 3600 secs
2020-04-04 03:35:12
185.56.153.229 attackbotsspam
Invalid user bill from 185.56.153.229 port 45416
2020-04-04 03:29:47
103.202.99.40 attack
Invalid user smrtanalysis from 103.202.99.40 port 41676
2020-04-04 03:59:44
117.198.98.191 attackspam
Invalid user user from 117.198.98.191 port 36489
2020-04-04 03:50:13
111.93.235.74 attack
$f2bV_matches
2020-04-04 03:52:17
112.21.191.54 attackspam
$f2bV_matches
2020-04-04 03:51:38
124.152.118.131 attackspambots
Invalid user xj from 124.152.118.131 port 2436
2020-04-04 03:47:17
178.128.49.135 attack
Invalid user jenkins from 178.128.49.135 port 42514
2020-04-04 03:33:13
139.198.17.144 attackspam
Apr  3 17:39:25 master sshd[23727]: Failed password for root from 139.198.17.144 port 34376 ssh2
Apr  3 17:47:44 master sshd[23756]: Failed password for root from 139.198.17.144 port 60588 ssh2
Apr  3 17:50:11 master sshd[23762]: Failed password for root from 139.198.17.144 port 53730 ssh2
Apr  3 17:52:18 master sshd[23766]: Failed password for root from 139.198.17.144 port 46836 ssh2
Apr  3 17:54:36 master sshd[23774]: Failed password for root from 139.198.17.144 port 39954 ssh2
Apr  3 17:56:47 master sshd[23780]: Failed password for root from 139.198.17.144 port 33068 ssh2
Apr  3 17:58:55 master sshd[23790]: Failed password for invalid user chimistry from 139.198.17.144 port 54410 ssh2
Apr  3 18:01:03 master sshd[23820]: Failed password for root from 139.198.17.144 port 47512 ssh2
Apr  3 18:03:15 master sshd[23826]: Failed password for root from 139.198.17.144 port 40612 ssh2
Apr  3 18:05:33 master sshd[23833]: Failed password for root from 139.198.17.144 port 33740 ssh2
2020-04-04 03:41:51
180.76.114.221 attack
Invalid user nbu from 180.76.114.221 port 33308
2020-04-04 03:32:05
176.113.115.42 attack
Apr  4 02:22:52 itv-usvr-01 sshd[18714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.113.115.42  user=root
Apr  4 02:22:54 itv-usvr-01 sshd[18714]: Failed password for root from 176.113.115.42 port 34480 ssh2
Apr  4 02:31:42 itv-usvr-01 sshd[19089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.113.115.42  user=root
Apr  4 02:31:44 itv-usvr-01 sshd[19089]: Failed password for root from 176.113.115.42 port 43752 ssh2
2020-04-04 03:34:52
106.12.178.249 attack
Apr  3 14:00:02 dallas01 sshd[18491]: Failed password for root from 106.12.178.249 port 55724 ssh2
Apr  3 14:05:10 dallas01 sshd[19605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.178.249
Apr  3 14:05:11 dallas01 sshd[19605]: Failed password for invalid user user from 106.12.178.249 port 57386 ssh2
2020-04-04 03:57:08
120.71.145.189 attackspam
$f2bV_matches
2020-04-04 03:48:26

Recently Reported IPs

221.126.75.237 231.243.109.63 223.127.118.31 194.35.248.3
57.117.31.217 159.207.243.110 192.253.100.93 175.190.204.190
49.63.250.139 124.135.169.150 169.169.172.138 218.215.51.156
87.74.43.126 93.235.212.67 230.173.150.184 28.166.185.107
47.205.68.220 247.41.12.181 251.216.50.169 50.187.134.121