Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.168.114.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49488
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.168.114.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:35:05 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 50.114.168.214.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 214.168.114.50.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
95.167.123.54 attackbotsspam
Brute force attack stopped by firewall
2019-12-12 09:06:09
109.101.196.50 attackspam
Sending SPAM email
2019-12-12 08:59:10
149.56.158.24 attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2019-12-12 08:55:52
200.77.186.199 attackspambots
Brute force attack stopped by firewall
2019-12-12 09:05:33
177.130.110.87 attackspambots
proto=tcp  .  spt=43192  .  dpt=25  .     (Found on   Dark List de Dec 11)     (18)
2019-12-12 09:23:38
194.8.136.62 attackspambots
Sending SPAM email
2019-12-12 09:31:20
128.199.44.102 attackspambots
Dec 11 14:43:27 web9 sshd\[28226\]: Invalid user unreal from 128.199.44.102
Dec 11 14:43:27 web9 sshd\[28226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.44.102
Dec 11 14:43:28 web9 sshd\[28226\]: Failed password for invalid user unreal from 128.199.44.102 port 47733 ssh2
Dec 11 14:48:36 web9 sshd\[29078\]: Invalid user hofmeister from 128.199.44.102
Dec 11 14:48:36 web9 sshd\[29078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.44.102
2019-12-12 08:56:08
103.53.110.45 attackspam
Brute force attack stopped by firewall
2019-12-12 09:10:49
77.81.230.143 attackbots
Dec 11 22:01:33 ldap01vmsma01 sshd[161968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.81.230.143
Dec 11 22:01:36 ldap01vmsma01 sshd[161968]: Failed password for invalid user symms from 77.81.230.143 port 39798 ssh2
...
2019-12-12 09:09:17
83.121.219.136 attackbots
[portscan] Port scan
2019-12-12 09:08:58
192.199.53.131 attack
Brute force attack stopped by firewall
2019-12-12 09:18:20
175.29.177.126 attack
Brute force attack stopped by firewall
2019-12-12 09:30:21
46.160.84.179 attack
Sending SPAM email
2019-12-12 09:03:02
46.35.184.187 attack
Brute force attack stopped by firewall
2019-12-12 09:22:47
77.42.97.97 attackbots
Automatic report - Port Scan Attack
2019-12-12 09:29:46

Recently Reported IPs

127.175.113.177 124.140.53.171 126.142.143.115 166.233.134.43
120.30.174.86 41.112.187.102 81.233.214.23 175.151.12.219
180.151.215.68 167.216.246.249 249.35.250.50 160.22.243.20
187.114.240.101 33.148.68.61 12.152.207.3 16.233.9.101
116.209.178.129 239.58.99.242 57.41.175.228 215.53.115.116