Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.222.179.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29491
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.222.179.242.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:27:10 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'Host 242.179.222.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 214.222.179.242.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.143.223.79 attackbots
Nov 24 10:44:25   TCP Attack: SRC=185.143.223.79 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=241  PROTO=TCP SPT=8080 DPT=59923 WINDOW=1024 RES=0x00 SYN URGP=0
2019-11-24 20:54:39
186.89.127.142 attackbots
Unauthorized connection attempt from IP address 186.89.127.142 on Port 445(SMB)
2019-11-24 21:04:15
198.23.223.172 attackspambots
198.23.223.172 was recorded 5 times by 4 hosts attempting to connect to the following ports: 8000,9000. Incident counter (4h, 24h, all-time): 5, 36, 36
2019-11-24 20:36:16
218.3.139.85 attackbots
2019-11-24T10:39:43.694183homeassistant sshd[29862]: Invalid user atila from 218.3.139.85 port 53751
2019-11-24T10:39:43.700572homeassistant sshd[29862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.3.139.85
...
2019-11-24 20:38:34
101.91.214.178 attackbotsspam
Nov 24 10:34:29 work-partkepr sshd\[17481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.214.178  user=root
Nov 24 10:34:31 work-partkepr sshd\[17481\]: Failed password for root from 101.91.214.178 port 36428 ssh2
...
2019-11-24 20:53:35
49.88.112.66 attack
Nov 24 09:42:11 firewall sshd[23416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.66  user=root
Nov 24 09:42:12 firewall sshd[23416]: Failed password for root from 49.88.112.66 port 12016 ssh2
Nov 24 09:42:14 firewall sshd[23416]: Failed password for root from 49.88.112.66 port 12016 ssh2
...
2019-11-24 20:54:55
142.255.41.95 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/142.255.41.95/ 
 
 US - 1H : (114)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN12271 
 
 IP : 142.255.41.95 
 
 CIDR : 142.255.0.0/17 
 
 PREFIX COUNT : 241 
 
 UNIQUE IP COUNT : 3248640 
 
 
 ATTACKS DETECTED ASN12271 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 2 
 24H - 3 
 
 DateTime : 2019-11-24 11:37:10 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-24 21:10:21
81.84.235.209 attack
Nov 24 13:23:05 vmd17057 sshd\[15405\]: Invalid user vyatta from 81.84.235.209 port 39864
Nov 24 13:23:05 vmd17057 sshd\[15405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.84.235.209
Nov 24 13:23:06 vmd17057 sshd\[15405\]: Failed password for invalid user vyatta from 81.84.235.209 port 39864 ssh2
...
2019-11-24 20:33:43
178.213.249.106 attackspambots
[portscan] Port scan
2019-11-24 20:47:12
192.228.100.238 attackspambots
firewall-block, port(s): 22/tcp
2019-11-24 21:01:11
119.159.229.247 attackbots
firewall-block, port(s): 1433/tcp
2019-11-24 20:32:29
77.40.62.101 attack
Nov 24 08:21:38 mail postfix/smtps/smtpd[2113]: warning: unknown[77.40.62.101]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 24 08:21:46 mail postfix/smtpd[4961]: warning: unknown[77.40.62.101]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 24 08:21:58 mail postfix/smtps/smtpd[5409]: warning: unknown[77.40.62.101]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-24 21:06:32
104.206.241.128 attackspambots
Automatic report generated by Wazuh
2019-11-24 21:02:55
45.148.234.173 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/45.148.234.173/ 
 
 EU - 1H : (4)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : EU 
 NAME ASN : ASN0 
 
 IP : 45.148.234.173 
 
 CIDR : 45.148.0.0/14 
 
 PREFIX COUNT : 50242 
 
 UNIQUE IP COUNT : 856039856 
 
 
 ATTACKS DETECTED ASN0 :  
  1H - 3 
  3H - 6 
  6H - 7 
 12H - 8 
 24H - 16 
 
 DateTime : 2019-11-24 07:19:23 
 
 INFO : Server 301 - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-11-24 20:59:17
87.10.54.170 attack
Nov 24 11:25:17 venus sshd\[12735\]: Invalid user pi from 87.10.54.170 port 50678
Nov 24 11:25:17 venus sshd\[12735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.10.54.170
Nov 24 11:25:17 venus sshd\[12736\]: Invalid user pi from 87.10.54.170 port 50684
...
2019-11-24 20:45:49

Recently Reported IPs

228.81.134.73 188.234.131.58 209.213.252.11 235.171.245.53
92.10.166.137 48.141.94.39 107.98.200.111 248.94.74.211
233.34.194.213 48.11.9.231 238.82.178.39 92.76.166.189
92.100.164.40 54.113.51.112 131.144.186.21 255.91.148.169
37.172.235.7 151.121.143.91 215.210.114.167 30.16.98.249