Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: DoD Network Information Center

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.247.17.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7133
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;214.247.17.53.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 12 02:56:22 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 53.17.247.214.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 53.17.247.214.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.183.33.106 attackbotsspam
Unauthorised access (Dec  4) SRC=62.183.33.106 LEN=52 TTL=114 ID=9705 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Dec  3) SRC=62.183.33.106 LEN=52 TTL=114 ID=28961 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Dec  3) SRC=62.183.33.106 LEN=52 TTL=114 ID=11996 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Dec  2) SRC=62.183.33.106 LEN=52 TTL=114 ID=2213 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-05 07:55:04
128.108.1.207 attackspam
ssh intrusion attempt
2019-12-05 07:46:50
212.47.231.189 attack
Dec  4 19:49:44 *** sshd[18560]: Failed password for invalid user hung from 212.47.231.189 port 47676 ssh2
Dec  4 19:55:18 *** sshd[18627]: Failed password for invalid user rpm from 212.47.231.189 port 60992 ssh2
Dec  4 20:00:31 *** sshd[18706]: Failed password for invalid user siljuberg from 212.47.231.189 port 43610 ssh2
Dec  4 20:07:40 *** sshd[18878]: Failed password for invalid user gdm from 212.47.231.189 port 54450 ssh2
Dec  4 20:18:25 *** sshd[19086]: Failed password for invalid user maxi from 212.47.231.189 port 47904 ssh2
Dec  4 20:29:27 *** sshd[19336]: Failed password for invalid user emylee from 212.47.231.189 port 41360 ssh2
Dec  4 20:34:48 *** sshd[19425]: Failed password for invalid user fq from 212.47.231.189 port 52202 ssh2
Dec  4 20:40:13 *** sshd[19566]: Failed password for invalid user on from 212.47.231.189 port 34812 ssh2
Dec  4 20:56:36 *** sshd[19913]: Failed password for invalid user host from 212.47.231.189 port 39104 ssh2
Dec  4 21:02:09 *** sshd[20029]: Failed password for invalid
2019-12-05 07:59:01
75.31.93.181 attack
Dec  4 21:11:30 Ubuntu-1404-trusty-64-minimal sshd\[21626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.31.93.181  user=root
Dec  4 21:11:32 Ubuntu-1404-trusty-64-minimal sshd\[21626\]: Failed password for root from 75.31.93.181 port 57134 ssh2
Dec  4 21:17:40 Ubuntu-1404-trusty-64-minimal sshd\[24913\]: Invalid user scan from 75.31.93.181
Dec  4 21:17:40 Ubuntu-1404-trusty-64-minimal sshd\[24913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.31.93.181
Dec  4 21:17:42 Ubuntu-1404-trusty-64-minimal sshd\[24913\]: Failed password for invalid user scan from 75.31.93.181 port 15812 ssh2
2019-12-05 07:57:45
134.175.111.215 attack
Dec  4 22:54:00 legacy sshd[12483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.111.215
Dec  4 22:54:03 legacy sshd[12483]: Failed password for invalid user celeron from 134.175.111.215 port 44306 ssh2
Dec  4 23:00:29 legacy sshd[12821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.111.215
...
2019-12-05 07:49:16
106.12.180.216 attack
SSH invalid-user multiple login attempts
2019-12-05 08:00:24
129.213.194.201 attack
web-1 [ssh_2] SSH Attack
2019-12-05 08:10:03
51.38.189.150 attack
2019-12-05T00:33:48.878124stark.klein-stark.info sshd\[21594\]: Invalid user kerry from 51.38.189.150 port 37082
2019-12-05T00:33:48.885999stark.klein-stark.info sshd\[21594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.ip-51-38-189.eu
2019-12-05T00:33:50.622505stark.klein-stark.info sshd\[21594\]: Failed password for invalid user kerry from 51.38.189.150 port 37082 ssh2
...
2019-12-05 07:46:35
61.220.182.91 attackspam
12/04/2019-23:19:25.962271 61.220.182.91 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-05 07:43:28
123.11.129.226 attackspambots
Port scan: Attack repeated for 24 hours
2019-12-05 07:36:01
218.92.0.137 attackbots
Dec  5 00:37:38 meumeu sshd[5114]: Failed password for root from 218.92.0.137 port 38550 ssh2
Dec  5 00:37:44 meumeu sshd[5114]: Failed password for root from 218.92.0.137 port 38550 ssh2
Dec  5 00:37:47 meumeu sshd[5114]: Failed password for root from 218.92.0.137 port 38550 ssh2
Dec  5 00:37:51 meumeu sshd[5114]: Failed password for root from 218.92.0.137 port 38550 ssh2
...
2019-12-05 07:56:28
222.186.175.182 attackbotsspam
Dec  5 01:08:21 ovpn sshd\[29244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Dec  5 01:08:23 ovpn sshd\[29244\]: Failed password for root from 222.186.175.182 port 32246 ssh2
Dec  5 01:08:41 ovpn sshd\[29319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Dec  5 01:08:43 ovpn sshd\[29319\]: Failed password for root from 222.186.175.182 port 56362 ssh2
Dec  5 01:08:53 ovpn sshd\[29319\]: Failed password for root from 222.186.175.182 port 56362 ssh2
2019-12-05 08:12:03
64.159.65.180 attack
Dec  4 18:24:32 mail1 postfix/smtpd[30084]: connect from vmta3.gmimediamail.com[64.159.65.180]
Dec  4 18:24:33 mail1 postgrey[1113]: action=greylist, reason=new, client_name=vmta3.gmimediamail.com, client_address=64.159.65.180, sender=x@x recipient=x@x
Dec x@x
Dec  4 18:24:35 mail1 postfix/smtpd[30084]: disconnect from vmta3.gmimediamail.com[64.159.65.180] ehlo=2 starttls=1 mail=1 rcpt=0/1 quhostname=1 commands=5/6
Dec  4 18:34:36 mail1 postfix/smtpd[1315]: connect from vmta3.gmimediamail.com[64.159.65.180]
Dec  4 18:34:38 mail1 postgrey[1113]: action=pass, reason=triplet found, delay=605, client_name=vmta3.gmimediamail.com, client_address=64.159.65.180, sender=x@x recipient=x@x
Dec x@x
Dec  4 18:34:41 mail1 postfix/smtpd[1315]: disconnect from vmta3.gmimediamail.com[64.159.65.180] ehlo=2 starttls=1 mail=1 rcpt=0/1 quhostname=1 commands=5/6
Dec  4 18:44:42 mail1 postfix/smtpd[1315]: connect from vmta3.gmimediamail.com[64.159.65.180]
Dec  4 18:44:43 mail1 postgrey[1113]:........
-------------------------------
2019-12-05 08:07:33
111.172.204.40 attackspam
" "
2019-12-05 08:13:08
117.186.85.238 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-05 07:47:13

Recently Reported IPs

175.233.226.21 145.234.23.81 1.163.232.136 198.5.110.159
115.34.200.107 204.96.37.35 60.42.253.224 144.174.6.26
219.139.205.29 145.32.8.236 239.178.244.120 175.145.56.64
92.104.185.79 211.77.52.61 98.156.159.181 15.235.136.233
239.146.111.134 109.3.238.7 87.82.71.17 105.95.76.231