Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.208.208.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9337
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.208.208.141.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 00:14:06 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 141.208.208.214.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 214.208.208.141.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
109.87.18.16 attack
Automatic report - Banned IP Access
2020-09-22 07:39:36
219.85.99.30 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-22 07:33:07
112.118.78.212 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-22 07:27:20
165.227.181.9 attack
SSH Brute-Forcing (server2)
2020-09-22 07:36:45
110.136.195.93 attackspam
Sep 21 17:33:56 www_kotimaassa_fi sshd[16981]: Failed password for root from 110.136.195.93 port 34177 ssh2
...
2020-09-22 07:22:41
220.94.220.212 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-22 07:21:08
46.20.191.51 attackbotsspam
Unauthorized connection attempt from IP address 46.20.191.51 on Port 445(SMB)
2020-09-22 07:32:44
77.165.210.149 attackspam
spammed contact form
2020-09-22 07:27:36
180.176.212.84 attackspambots
Unauthorized connection attempt from IP address 180.176.212.84 on Port 445(SMB)
2020-09-22 07:57:25
212.142.226.93 attackbotsspam
(imapd) Failed IMAP login from 212.142.226.93 (ES/Spain/93.212-142-226.static.clientes.euskaltel.es): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Sep 21 20:32:10 ir1 dovecot[1917636]: imap-login: Disconnected (auth failed, 1 attempts in 5 secs): user=, method=PLAIN, rip=212.142.226.93, lip=5.63.12.44, TLS, session=<1Dlez9WvlQ/UjuJd>
2020-09-22 07:56:30
92.189.133.165 attackbots
Unauthorized connection attempt from IP address 92.189.133.165 on Port 445(SMB)
2020-09-22 07:26:32
41.227.30.89 attackbots
Unauthorized connection attempt from IP address 41.227.30.89 on Port 445(SMB)
2020-09-22 07:40:08
190.141.65.223 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-22 07:33:46
124.207.221.66 attack
Sep 21 23:09:42 rocket sshd[666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.207.221.66
Sep 21 23:09:44 rocket sshd[666]: Failed password for invalid user user from 124.207.221.66 port 60556 ssh2
...
2020-09-22 07:25:20
54.36.190.245 attackspambots
Sep 22 00:10:20  sshd\[23978\]: User root from 245.ip-54-36-190.eu not allowed because not listed in AllowUsersSep 22 00:10:22  sshd\[23978\]: Failed password for invalid user root from 54.36.190.245 port 49954 ssh2
...
2020-09-22 07:45:30

Recently Reported IPs

14.226.5.217 189.57.5.254 77.86.37.92 70.230.177.103
54.132.155.72 100.31.13.26 175.24.103.131 17.2.24.5
48.112.77.245 225.48.55.20 4.151.223.30 137.212.150.118
246.244.46.78 156.227.169.92 137.146.82.178 125.166.250.96
181.197.78.129 63.108.185.119 252.127.3.16 215.224.255.132