Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       214.0.0.0 - 214.255.255.255
CIDR:           214.0.0.0/8
NetName:        DNIC-NET-214
NetHandle:      NET-214-0-0-0-1
Parent:          ()
NetType:        Direct Allocation
OriginAS:       
Organization:   United States Department of Defense (DoD) (USDDD)
RegDate:        1998-03-27
Updated:        2025-09-05
Ref:            https://rdap.arin.net/registry/ip/214.0.0.0


OrgName:        United States Department of Defense (DoD)
OrgId:          USDDD
Address:        3990 E. Broad Street
City:           Columbus
StateProv:      OH
PostalCode:     43218
Country:        US
RegDate:        2007-01-12
Updated:        2025-03-13
Ref:            https://rdap.arin.net/registry/entity/USDDD


OrgAbuseHandle: MIL-HSTMST-ARIN
OrgAbuseName:   Network DoD
OrgAbusePhone:  +1-844-347-2457 
OrgAbuseEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

OrgNOCHandle: MIL-HSTMST-ARIN
OrgNOCName:   Network DoD
OrgNOCPhone:  +1-844-347-2457 
OrgNOCEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgNOCRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

OrgTechHandle: REGIS10-ARIN
OrgTechName:   Registration
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName:   Network DoD
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

# end


# start

NetRange:       214.0.0.0 - 214.255.255.255
CIDR:           214.0.0.0/8
NetName:        DNIC-NET-214
NetHandle:      NET-214-0-0-0-2
Parent:         DNIC-NET-214 (NET-214-0-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   DoD Network Information Center (DNIC)
RegDate:        2025-09-05
Updated:        2025-09-05
Ref:            https://rdap.arin.net/registry/ip/214.0.0.0


OrgName:        DoD Network Information Center
OrgId:          DNIC
Address:        3990 E. Broad Street
City:           Columbus
StateProv:      OH
PostalCode:     43218
Country:        US
RegDate:        
Updated:        2025-03-13
Ref:            https://rdap.arin.net/registry/entity/DNIC


OrgTechHandle: REGIS10-ARIN
OrgTechName:   Registration
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName:   Network DoD
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName:   Registration
OrgAbusePhone:  +1-844-347-2457 
OrgAbuseEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.213.150.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11744
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.213.150.93.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040401 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 05 02:07:38 CST 2026
;; MSG SIZE  rcvd: 107
Host info
b'Host 93.150.213.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 214.213.150.93.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
142.93.209.221 attack
142.93.209.221 - - \[01/Dec/2019:21:08:03 +0000\] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
142.93.209.221 - - \[01/Dec/2019:21:08:04 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-12-02 06:03:44
104.248.121.67 attack
Dec  1 22:48:29 vps691689 sshd[18706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67
Dec  1 22:48:30 vps691689 sshd[18706]: Failed password for invalid user loge from 104.248.121.67 port 33936 ssh2
...
2019-12-02 05:59:42
106.52.174.139 attack
Dec  1 22:44:18 localhost sshd\[30795\]: Invalid user admin from 106.52.174.139 port 38870
Dec  1 22:44:18 localhost sshd\[30795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.174.139
Dec  1 22:44:19 localhost sshd\[30795\]: Failed password for invalid user admin from 106.52.174.139 port 38870 ssh2
2019-12-02 05:57:22
106.13.211.195 attack
Nov   30   17:09:32   106.13.211.195   PROTO=TCP   SPT=38270 DPT=6379
Nov   30   17:09:33   106.13.211.195   PROTO=TCP   SPT=38270 DPT=6379
Nov   30   17:09:33   106.13.211.195   PROTO=TCP   SPT=59084 DPT=8080
Nov   30   17:09:34   106.13.211.195   PROTO=TCP   SPT=59084 DPT=8080
Nov   30   17:09:34   106.13.211.195   PROTO=TCP   SPT=52970 DPT=9200
2019-12-02 06:38:02
92.96.235.201 attackspam
Dec  1 19:00:12 XXX sshd[42933]: Invalid user user from 92.96.235.201 port 63884
2019-12-02 06:12:33
85.192.32.246 attackspambots
Dec  1 19:05:44 [HOSTNAME] sshd[22939]: Invalid user admin from 85.192.32.246 port 62141
Dec  1 19:06:20 [HOSTNAME] sshd[22942]: Invalid user admin from 85.192.32.246 port 59258
Dec  1 19:06:51 [HOSTNAME] sshd[22950]: Invalid user admin from 85.192.32.246 port 55379
...
2019-12-02 05:59:58
221.212.18.146 attackbots
'IP reached maximum auth failures for a one day block'
2019-12-02 06:33:09
148.70.246.130 attack
Dec  1 06:26:33 php1 sshd\[7002\]: Invalid user innodesign from 148.70.246.130
Dec  1 06:26:33 php1 sshd\[7002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.246.130
Dec  1 06:26:36 php1 sshd\[7002\]: Failed password for invalid user innodesign from 148.70.246.130 port 48755 ssh2
Dec  1 06:30:59 php1 sshd\[7413\]: Invalid user nfs from 148.70.246.130
Dec  1 06:30:59 php1 sshd\[7413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.246.130
2019-12-02 06:29:50
80.211.137.127 attack
2019-12-01T13:03:15.949067suse-nuc sshd[25702]: Invalid user oam from 80.211.137.127 port 49952
...
2019-12-02 06:17:48
177.36.223.146 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-12-02 06:16:39
106.13.97.226 attackspam
Dec  1 16:40:57 ny01 sshd[13043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.97.226
Dec  1 16:40:59 ny01 sshd[13043]: Failed password for invalid user okon from 106.13.97.226 port 57456 ssh2
Dec  1 16:46:16 ny01 sshd[13607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.97.226
2019-12-02 05:59:10
197.44.76.51 attack
Unauthorised access (Dec  1) SRC=197.44.76.51 LEN=40 TTL=50 ID=58392 TCP DPT=8080 WINDOW=27485 SYN 
Unauthorised access (Dec  1) SRC=197.44.76.51 LEN=40 TTL=50 ID=61982 TCP DPT=8080 WINDOW=27485 SYN
2019-12-02 06:15:39
185.175.93.45 attack
12/01/2019-22:47:00.519178 185.175.93.45 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-02 06:20:09
167.71.162.245 attackspam
[munged]::443 167.71.162.245 - - [01/Dec/2019:23:06:46 +0100] "POST /[munged]: HTTP/1.1" 200 9082 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 167.71.162.245 - - [01/Dec/2019:23:06:57 +0100] "POST /[munged]: HTTP/1.1" 200 9082 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 167.71.162.245 - - [01/Dec/2019:23:06:57 +0100] "POST /[munged]: HTTP/1.1" 200 9082 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-02 06:24:42
125.160.67.230 attack
port scan and connect, tcp 22 (ssh)
2019-12-02 06:13:15

Recently Reported IPs

121.207.23.164 110.77.226.201 2606:4700:10::ac43:929 2606:4700:10::6814:8043
2606:4700:10::6814:8620 14.207.194.193 2606:4700:10::6816:418d 198.182.171.38
110.77.187.109 2606:4700:10::6814:7801 2606:4700:10::6814:7912 2606:4700:10::6814:6563
2606:4700:10::6816:401d 2606:4700:10::ac43:2337 2606:4700:10::6814:6260 2606:4700:10::ac43:883
2606:4700:10::6816:2558 113.215.188.52 95.85.244.180 2606:4700:10::6814:7878