Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.216.64.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58044
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.216.64.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 15:45:46 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 159.64.216.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 214.216.64.159.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
134.209.21.83 attack
Sep 22 05:47:19 hcbbdb sshd\[28135\]: Invalid user nodes from 134.209.21.83
Sep 22 05:47:19 hcbbdb sshd\[28135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.21.83
Sep 22 05:47:21 hcbbdb sshd\[28135\]: Failed password for invalid user nodes from 134.209.21.83 port 33308 ssh2
Sep 22 05:51:30 hcbbdb sshd\[28625\]: Invalid user admin from 134.209.21.83
Sep 22 05:51:30 hcbbdb sshd\[28625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.21.83
2019-09-22 14:04:00
118.98.121.207 attack
Sep 21 19:42:53 auw2 sshd\[32288\]: Invalid user ulpiano from 118.98.121.207
Sep 21 19:42:53 auw2 sshd\[32288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.121.207
Sep 21 19:42:55 auw2 sshd\[32288\]: Failed password for invalid user ulpiano from 118.98.121.207 port 53846 ssh2
Sep 21 19:48:22 auw2 sshd\[387\]: Invalid user y from 118.98.121.207
Sep 21 19:48:22 auw2 sshd\[387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.121.207
2019-09-22 13:48:59
200.248.160.146 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 04:55:22.
2019-09-22 13:54:54
73.137.130.75 attackbots
Sep 22 07:57:29 rpi sshd[18693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.137.130.75 
Sep 22 07:57:31 rpi sshd[18693]: Failed password for invalid user 1234 from 73.137.130.75 port 50206 ssh2
2019-09-22 14:13:45
142.44.211.229 attackbots
2019-09-22T03:54:13.709989abusebot-7.cloudsearch.cf sshd\[20443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=229.ip-142-44-211.net  user=root
2019-09-22 14:07:43
101.124.6.112 attackspam
Sep 22 00:52:02 aat-srv002 sshd[8507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.124.6.112
Sep 22 00:52:05 aat-srv002 sshd[8507]: Failed password for invalid user zhao from 101.124.6.112 port 53352 ssh2
Sep 22 00:55:30 aat-srv002 sshd[8625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.124.6.112
Sep 22 00:55:32 aat-srv002 sshd[8625]: Failed password for invalid user install from 101.124.6.112 port 51040 ssh2
...
2019-09-22 14:22:27
106.12.116.237 attackspam
2019-09-22T05:00:01.461256abusebot-7.cloudsearch.cf sshd\[20882\]: Invalid user ks from 106.12.116.237 port 58940
2019-09-22 13:58:44
192.117.186.215 attackspambots
Sep 21 20:22:39 web1 sshd\[1327\]: Invalid user testuser from 192.117.186.215
Sep 21 20:22:39 web1 sshd\[1327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.117.186.215
Sep 21 20:22:40 web1 sshd\[1327\]: Failed password for invalid user testuser from 192.117.186.215 port 60664 ssh2
Sep 21 20:26:28 web1 sshd\[1770\]: Invalid user artin from 192.117.186.215
Sep 21 20:26:28 web1 sshd\[1770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.117.186.215
2019-09-22 14:26:33
119.254.155.118 attackspam
Sep 21 19:50:17 eddieflores sshd\[4599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.254.155.118  user=root
Sep 21 19:50:19 eddieflores sshd\[4599\]: Failed password for root from 119.254.155.118 port 54776 ssh2
Sep 21 19:56:22 eddieflores sshd\[5145\]: Invalid user ftptest from 119.254.155.118
Sep 21 19:56:22 eddieflores sshd\[5145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.254.155.118
Sep 21 19:56:24 eddieflores sshd\[5145\]: Failed password for invalid user ftptest from 119.254.155.118 port 38944 ssh2
2019-09-22 14:02:56
122.225.86.82 attackbotsspam
Port Scan: TCP/445
2019-09-22 13:59:52
142.93.49.103 attackspambots
Sep 21 20:06:51 eddieflores sshd\[6133\]: Invalid user IBM from 142.93.49.103
Sep 21 20:06:51 eddieflores sshd\[6133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.49.103
Sep 21 20:06:53 eddieflores sshd\[6133\]: Failed password for invalid user IBM from 142.93.49.103 port 56048 ssh2
Sep 21 20:11:00 eddieflores sshd\[6570\]: Invalid user zabbix from 142.93.49.103
Sep 21 20:11:00 eddieflores sshd\[6570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.49.103
2019-09-22 14:25:49
46.38.144.202 attackspambots
Sep 22 07:52:24 mail postfix/smtpd\[3065\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 22 07:54:49 mail postfix/smtpd\[4508\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 22 07:57:15 mail postfix/smtpd\[4505\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-22 14:04:30
183.161.35.38 attackbotsspam
failed_logins
2019-09-22 14:07:26
222.242.104.188 attackbots
Sep 22 02:02:32 xtremcommunity sshd\[349941\]: Invalid user squ1sh from 222.242.104.188 port 47312
Sep 22 02:02:32 xtremcommunity sshd\[349941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.242.104.188
Sep 22 02:02:33 xtremcommunity sshd\[349941\]: Failed password for invalid user squ1sh from 222.242.104.188 port 47312 ssh2
Sep 22 02:09:05 xtremcommunity sshd\[350102\]: Invalid user norberta from 222.242.104.188 port 58837
Sep 22 02:09:05 xtremcommunity sshd\[350102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.242.104.188
...
2019-09-22 14:18:17
61.184.187.130 attackspam
Sep 22 06:15:18 hcbbdb sshd\[31504\]: Invalid user user from 61.184.187.130
Sep 22 06:15:18 hcbbdb sshd\[31504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.184.187.130
Sep 22 06:15:20 hcbbdb sshd\[31504\]: Failed password for invalid user user from 61.184.187.130 port 39378 ssh2
Sep 22 06:21:45 hcbbdb sshd\[32289\]: Invalid user trainer from 61.184.187.130
Sep 22 06:21:45 hcbbdb sshd\[32289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.184.187.130
2019-09-22 14:28:49

Recently Reported IPs

152.217.117.224 125.0.245.124 152.93.52.144 231.117.36.56
17.171.179.40 156.161.241.163 247.199.141.45 63.78.235.115
150.11.130.94 115.3.66.249 40.238.113.242 234.167.247.9
87.139.72.174 59.121.121.176 164.26.182.136 86.139.17.35
218.229.152.64 71.119.173.117 180.159.47.27 249.116.200.239