Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.212.190.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16131
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.212.190.214.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 20:02:20 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'Host 214.190.212.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 214.212.190.214.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
176.56.236.21 attack
Aug  8 06:48:51 MK-Soft-VM4 sshd\[23084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.56.236.21  user=root
Aug  8 06:48:53 MK-Soft-VM4 sshd\[23084\]: Failed password for root from 176.56.236.21 port 43200 ssh2
Aug  8 06:53:57 MK-Soft-VM4 sshd\[26073\]: Invalid user hadoop from 176.56.236.21 port 44982
Aug  8 06:53:57 MK-Soft-VM4 sshd\[26073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.56.236.21
...
2019-08-08 15:17:08
128.14.137.181 attackbots
firewall-block, port(s): 80/tcp
2019-08-08 14:43:38
175.126.176.21 attackspambots
2019-08-08T06:38:55.628608abusebot-8.cloudsearch.cf sshd\[13015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.176.21  user=root
2019-08-08 15:09:47
185.86.164.107 attackspambots
Attempted WordPress login: "GET /wp-login.php"
2019-08-08 14:48:28
222.122.94.18 attack
SSH Brute-Force reported by Fail2Ban
2019-08-08 14:46:30
195.209.48.253 attack
[portscan] Port scan
2019-08-08 14:58:37
5.249.149.174 attackbots
Automatic report - Banned IP Access
2019-08-08 14:39:09
178.128.150.79 attackspambots
[ssh] SSH attack
2019-08-08 14:55:21
92.63.194.115 attackspambots
firewall-block, port(s): 42970/tcp
2019-08-08 15:09:09
187.188.169.123 attackbotsspam
Aug  8 08:37:16 localhost sshd\[12844\]: Invalid user cav from 187.188.169.123 port 49706
Aug  8 08:37:16 localhost sshd\[12844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.169.123
Aug  8 08:37:18 localhost sshd\[12844\]: Failed password for invalid user cav from 187.188.169.123 port 49706 ssh2
2019-08-08 14:37:55
67.205.140.232 attack
xmlrpc attack
2019-08-08 15:22:47
98.207.101.228 attackbotsspam
Aug  8 01:44:21 aat-srv002 sshd[3407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.207.101.228
Aug  8 01:44:23 aat-srv002 sshd[3407]: Failed password for invalid user shoutcast from 98.207.101.228 port 41693 ssh2
Aug  8 01:55:55 aat-srv002 sshd[3634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.207.101.228
Aug  8 01:55:57 aat-srv002 sshd[3634]: Failed password for invalid user jboss from 98.207.101.228 port 38523 ssh2
...
2019-08-08 15:06:41
42.237.93.46 attack
23/tcp
[2019-08-08]1pkt
2019-08-08 15:13:51
180.126.232.92 attack
Telnet Server BruteForce Attack
2019-08-08 15:23:17
128.199.87.57 attackbots
Aug  8 01:59:59 aat-srv002 sshd[3742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.87.57
Aug  8 02:00:01 aat-srv002 sshd[3742]: Failed password for invalid user ftpuser from 128.199.87.57 port 54202 ssh2
Aug  8 02:06:06 aat-srv002 sshd[3992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.87.57
Aug  8 02:06:09 aat-srv002 sshd[3992]: Failed password for invalid user temp from 128.199.87.57 port 50575 ssh2
...
2019-08-08 15:26:03

Recently Reported IPs

78.245.111.243 136.63.231.114 212.31.173.28 96.247.208.143
181.162.74.208 227.156.114.65 6.109.26.117 4.163.191.66
142.246.113.66 103.145.0.225 213.103.61.84 148.244.190.103
161.142.234.147 78.1.33.13 96.172.104.101 210.17.30.153
96.163.251.73 181.205.118.168 47.42.239.146 160.86.186.249