Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.193.42.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58023
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.193.42.234.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 08:35:10 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 234.42.193.214.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 214.193.42.234.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
51.255.84.223 attackspam
2020-02-23T00:48:10.959368vps773228.ovh.net sshd[9390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3038619.ip-51-255-84.eu
2020-02-23T00:48:10.944429vps773228.ovh.net sshd[9390]: Invalid user pgadmin from 51.255.84.223 port 34402
2020-02-23T00:48:12.882677vps773228.ovh.net sshd[9390]: Failed password for invalid user pgadmin from 51.255.84.223 port 34402 ssh2
2020-02-23T01:48:44.815012vps773228.ovh.net sshd[9479]: Invalid user web from 51.255.84.223 port 49086
2020-02-23T01:48:44.838481vps773228.ovh.net sshd[9479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3038619.ip-51-255-84.eu
2020-02-23T01:48:44.815012vps773228.ovh.net sshd[9479]: Invalid user web from 51.255.84.223 port 49086
2020-02-23T01:48:46.977932vps773228.ovh.net sshd[9479]: Failed password for invalid user web from 51.255.84.223 port 49086 ssh2
2020-02-23T01:49:05.019621vps773228.ovh.net sshd[9481]: Invalid user web from 51.255.84
...
2020-02-23 09:00:17
91.121.16.153 attackspambots
Invalid user contact from 91.121.16.153 port 44504
2020-02-23 08:35:42
134.209.171.203 attackspam
Invalid user test2 from 134.209.171.203 port 40734
2020-02-23 08:27:08
222.186.175.212 attackspam
Feb 22 21:55:20 firewall sshd[14281]: Failed password for root from 222.186.175.212 port 37612 ssh2
Feb 22 21:55:31 firewall sshd[14281]: error: maximum authentication attempts exceeded for root from 222.186.175.212 port 37612 ssh2 [preauth]
Feb 22 21:55:31 firewall sshd[14281]: Disconnecting: Too many authentication failures [preauth]
...
2020-02-23 08:59:05
121.182.166.82 attackspam
Invalid user vmail from 121.182.166.82 port 55738
2020-02-23 08:28:35
144.91.92.236 attackspambots
144.91.92.236 was recorded 9 times by 9 hosts attempting to connect to the following ports: 389. Incident counter (4h, 24h, all-time): 9, 24, 203
2020-02-23 08:55:45
163.172.178.153 attack
SSH Brute Force
2020-02-23 08:24:39
182.61.182.50 attackbotsspam
SSH bruteforce
2020-02-23 09:01:11
163.172.77.243 attackspambots
sshd jail - ssh hack attempt
2020-02-23 08:24:53
222.186.175.169 attack
$f2bV_matches
2020-02-23 09:04:00
185.209.0.19 attackspambots
02/22/2020-19:26:32.137736 185.209.0.19 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-23 08:42:38
218.92.0.184 attack
Feb 23 01:49:10 MK-Soft-Root2 sshd[22376]: Failed password for root from 218.92.0.184 port 40760 ssh2
Feb 23 01:49:15 MK-Soft-Root2 sshd[22376]: Failed password for root from 218.92.0.184 port 40760 ssh2
...
2020-02-23 08:53:03
114.220.76.79 attackbots
$f2bV_matches
2020-02-23 08:52:16
175.31.230.217 attackspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-02-23 08:43:56
45.65.196.14 attackspambots
Feb 23 01:48:50  sshd[515]: Failed password for invalid user mapred from 45.65.196.14 port 42690 ssh2
2020-02-23 09:03:04

Recently Reported IPs

146.151.81.148 218.172.95.65 162.150.182.223 194.182.216.190
205.157.214.226 192.165.233.213 25.112.8.12 50.103.127.50
126.48.164.246 161.86.41.134 151.216.47.43 232.242.253.212
133.11.50.49 213.179.79.196 171.58.187.189 54.38.145.8
180.60.52.165 244.138.92.233 107.239.26.230 124.74.195.125