Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.224.134.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34829
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.224.134.60.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:49:10 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 60.134.224.214.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 214.224.134.60.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
1.52.62.241 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08050931)
2019-08-05 18:42:10
77.37.130.78 attackspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08050931)
2019-08-05 18:35:28
77.45.188.242 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=27420)(08050931)
2019-08-05 19:04:42
223.105.4.244 attackbots
[portscan] tcp/83 [mit-ml-dev]
[portscan] tcp/87 [tcp/87]
[scan/connect: 4 time(s)]
*(RWIN=1024)(08050931)
2019-08-05 18:17:48
217.61.4.103 attackbots
[portscan] tcp/21 [FTP]
*(RWIN=1024)(08050931)
2019-08-05 18:53:27
162.243.150.95 attackbotsspam
[portscan] tcp/26 [tcp/26]
*(RWIN=65535)(08050931)
2019-08-05 18:26:18
12.8.83.167 attack
[portscan] tcp/23 [TELNET]
*(RWIN=14600)(08050931)
2019-08-05 18:17:18
194.58.70.211 attackspam
Unauthorized connection attempt from IP address 194.58.70.211 on Port 445(SMB)
2019-08-05 18:55:23
35.205.202.174 attackspambots
[portscan] tcp/1433 [MsSQL]
*(RWIN=65535)(08050931)
2019-08-05 18:39:27
85.159.5.94 attack
Unauthorised access (Aug  5) SRC=85.159.5.94 LEN=44 TTL=57 ID=53635 TCP DPT=23 WINDOW=43081 SYN
2019-08-05 18:34:16
71.6.146.185 attackbotsspam
Distributed brute force attack
2019-08-05 18:13:11
211.234.122.227 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 18:42:48
35.195.6.14 attack
[portscan] tcp/1433 [MsSQL]
*(RWIN=65535)(08050931)
2019-08-05 18:40:04
195.29.137.197 attack
[portscan] tcp/139 [NetBIOS Session Service]
[SMB remote code execution attempt: port tcp/445]
[scan/connect: 2 time(s)]
*(RWIN=1024)(08050931)
2019-08-05 18:21:31
71.6.232.4 attack
:
2019-08-05 18:36:06

Recently Reported IPs

141.14.90.24 224.59.250.224 62.113.198.141 34.52.115.155
85.175.8.36 86.216.138.178 119.219.252.94 194.172.172.74
191.190.63.36 172.148.202.158 37.238.228.114 167.176.79.154
181.76.26.148 21.29.230.209 192.139.23.231 211.232.143.227
99.3.171.211 26.254.186.142 243.216.45.252 210.171.154.38