Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.164.57.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65508
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.164.57.141.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 07:17:47 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 141.57.164.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 214.164.57.141.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
36.109.218.106 attackspam
Port probing on unauthorized port 2323
2020-02-16 08:44:25
116.68.244.202 attackspambots
Feb 15 14:14:07 sachi sshd\[8320\]: Invalid user user4 from 116.68.244.202
Feb 15 14:14:07 sachi sshd\[8320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.68.244.202
Feb 15 14:14:08 sachi sshd\[8320\]: Failed password for invalid user user4 from 116.68.244.202 port 49520 ssh2
Feb 15 14:20:02 sachi sshd\[8886\]: Invalid user hotel from 116.68.244.202
Feb 15 14:20:02 sachi sshd\[8886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.68.244.202
2020-02-16 08:24:01
191.207.74.59 attackspambots
port scan and connect, tcp 23 (telnet)
2020-02-16 09:03:50
61.148.16.162 attack
Feb  3 07:47:41 pi sshd[3639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.148.16.162  user=root
Feb  3 07:47:43 pi sshd[3639]: Failed password for invalid user root from 61.148.16.162 port 38291 ssh2
2020-02-16 08:15:52
103.212.211.164 attackbotsspam
Feb 15 14:03:09 auw2 sshd\[13178\]: Invalid user topgun from 103.212.211.164
Feb 15 14:03:09 auw2 sshd\[13178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.212.211.164
Feb 15 14:03:11 auw2 sshd\[13178\]: Failed password for invalid user topgun from 103.212.211.164 port 33622 ssh2
Feb 15 14:06:20 auw2 sshd\[13507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.212.211.164  user=root
Feb 15 14:06:22 auw2 sshd\[13507\]: Failed password for root from 103.212.211.164 port 58110 ssh2
2020-02-16 08:11:12
193.112.89.32 attackspam
Feb 15 23:18:22 localhost sshd\[12531\]: Invalid user tomcat from 193.112.89.32 port 50820
Feb 15 23:18:22 localhost sshd\[12531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.89.32
Feb 15 23:18:25 localhost sshd\[12531\]: Failed password for invalid user tomcat from 193.112.89.32 port 50820 ssh2
2020-02-16 08:34:30
46.101.124.220 attack
Automatic report - SSH Brute-Force Attack
2020-02-16 09:03:18
143.202.96.202 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 08:15:23
143.202.59.222 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 08:30:33
106.13.200.50 attack
Feb 15 23:18:25 mout sshd[13656]: Invalid user rhodecode from 106.13.200.50 port 39182
2020-02-16 08:35:54
106.57.221.161 attackspambots
Feb 16 01:42:38 www4 sshd\[5808\]: Invalid user admin from 106.57.221.161
Feb 16 01:42:38 www4 sshd\[5808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.57.221.161
Feb 16 01:42:40 www4 sshd\[5808\]: Failed password for invalid user admin from 106.57.221.161 port 4069 ssh2
...
2020-02-16 08:20:19
78.196.136.19 attack
Feb 15 23:18:42 srv206 sshd[4986]: Invalid user pi from 78.196.136.19
Feb 15 23:18:42 srv206 sshd[4985]: Invalid user pi from 78.196.136.19
...
2020-02-16 08:23:04
223.240.208.164 attackspam
22:18:29.170 1 ACCOUNT(james) login(SMTP) from [223.240.208.164] failed. Error Code=incorrect password
22:18:48.110 1 ACCOUNT(james) login(SMTP) from [223.240.208.164] failed. Error Code=incorrect password
...
2020-02-16 08:21:00
51.77.147.95 attackspambots
SSH bruteforce (Triggered fail2ban)
2020-02-16 08:33:11
121.7.127.92 attackbotsspam
Feb 16 00:21:17 MK-Soft-VM3 sshd[9224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.7.127.92 
Feb 16 00:21:18 MK-Soft-VM3 sshd[9224]: Failed password for invalid user shilo from 121.7.127.92 port 40529 ssh2
...
2020-02-16 08:57:35

Recently Reported IPs

216.218.56.199 253.105.193.163 49.85.159.250 214.229.84.36
187.197.180.208 240.152.38.230 231.26.40.22 233.57.175.230
197.134.117.162 211.13.177.146 21.1.218.65 241.87.200.106
195.105.234.110 160.216.122.215 87.108.52.194 82.223.216.208
200.189.247.2 229.243.94.67 229.246.77.206 165.130.191.222