Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.249.220.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21082
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.249.220.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 05:18:34 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 12.220.249.214.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 214.249.220.12.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
177.130.110.87 attackspambots
proto=tcp  .  spt=43192  .  dpt=25  .     (Found on   Dark List de Dec 11)     (18)
2019-12-12 09:23:38
221.226.58.102 attack
Dec 12 00:41:39 heissa sshd\[4515\]: Invalid user webadmin from 221.226.58.102 port 52090
Dec 12 00:41:39 heissa sshd\[4515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.58.102
Dec 12 00:41:41 heissa sshd\[4515\]: Failed password for invalid user webadmin from 221.226.58.102 port 52090 ssh2
Dec 12 00:47:18 heissa sshd\[5336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.58.102  user=root
Dec 12 00:47:20 heissa sshd\[5336\]: Failed password for root from 221.226.58.102 port 49286 ssh2
2019-12-12 09:50:00
89.106.251.6 attack
Unauthorized connection attempt detected from IP address 89.106.251.6 to port 445
2019-12-12 09:56:14
91.213.119.246 attack
Brute force attack stopped by firewall
2019-12-12 09:26:12
194.8.136.62 attackspambots
Sending SPAM email
2019-12-12 09:31:20
77.108.66.178 attackspam
Brute force attack stopped by firewall
2019-12-12 09:41:55
192.199.53.131 attack
Brute force attack stopped by firewall
2019-12-12 09:18:20
176.31.253.55 attackspambots
Dec 11 15:11:09 sachi sshd\[18354\]: Invalid user com from 176.31.253.55
Dec 11 15:11:09 sachi sshd\[18354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns388274.ip-176-31-253.eu
Dec 11 15:11:11 sachi sshd\[18354\]: Failed password for invalid user com from 176.31.253.55 port 58452 ssh2
Dec 11 15:16:20 sachi sshd\[18811\]: Invalid user sa1984 from 176.31.253.55
Dec 11 15:16:20 sachi sshd\[18811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns388274.ip-176-31-253.eu
2019-12-12 09:30:01
177.19.238.230 attackbots
Brute force attack stopped by firewall
2019-12-12 09:36:01
173.217.255.36 attackspambots
Brute force attack stopped by firewall
2019-12-12 09:37:56
218.189.15.187 attackbotsspam
Brute force attack stopped by firewall
2019-12-12 09:49:04
122.248.103.64 attack
proto=tcp  .  spt=60568  .  dpt=25  .     (Found on   Blocklist de  Dec 11)     (29)
2019-12-12 09:43:59
190.145.159.26 attackbotsspam
Brute force attack stopped by firewall
2019-12-12 09:18:50
166.78.71.3 attackbots
Brute force attack stopped by firewall
2019-12-12 09:47:19
27.147.217.194 attack
Brute force attack stopped by firewall
2019-12-12 09:19:15

Recently Reported IPs

128.27.162.129 165.147.88.139 21.211.21.29 203.211.107.36
214.103.5.155 251.29.212.184 16.44.118.45 40.109.216.140
242.241.108.255 197.138.254.250 104.109.92.81 49.94.146.14
207.173.119.82 217.192.181.31 205.60.101.41 96.131.160.246
142.206.239.6 32.156.6.171 21.159.186.121 32.46.176.42