Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.253.19.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25982
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.253.19.221.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 21:27:20 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 221.19.253.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 214.253.19.221.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
111.231.138.136 attackbotsspam
2019-12-29T13:14:08.040989abusebot-4.cloudsearch.cf sshd[22683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.138.136  user=root
2019-12-29T13:14:10.612092abusebot-4.cloudsearch.cf sshd[22683]: Failed password for root from 111.231.138.136 port 40026 ssh2
2019-12-29T13:17:13.890752abusebot-4.cloudsearch.cf sshd[22689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.138.136  user=daemon
2019-12-29T13:17:15.859626abusebot-4.cloudsearch.cf sshd[22689]: Failed password for daemon from 111.231.138.136 port 56494 ssh2
2019-12-29T13:20:19.037301abusebot-4.cloudsearch.cf sshd[22693]: Invalid user test from 111.231.138.136 port 44770
2019-12-29T13:20:19.044956abusebot-4.cloudsearch.cf sshd[22693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.138.136
2019-12-29T13:20:19.037301abusebot-4.cloudsearch.cf sshd[22693]: Invalid user test from 111.231.13
...
2019-12-29 21:46:49
49.149.72.26 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 29-12-2019 06:25:09.
2019-12-29 21:37:45
46.105.211.42 attack
[Aegis] @ 2019-12-29 13:29:55  0000 -> SSH insecure connection attempt (scan).
2019-12-29 21:38:15
183.88.234.241 attackspambots
12/29/2019-07:25:30.811088 183.88.234.241 Protocol: 6 ET POLICY Cleartext WordPress Login
2019-12-29 21:20:37
18.224.251.17 attackbots
Automatic report - XMLRPC Attack
2019-12-29 21:28:03
203.92.33.93 attackbots
203.92.33.93 - - [29/Dec/2019:06:24:56 +0000] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
203.92.33.93 - - [29/Dec/2019:06:24:58 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-29 21:47:17
31.171.108.133 attackspambots
Dec 29 08:33:04 mout sshd[6787]: Invalid user leonida from 31.171.108.133 port 33150
2019-12-29 21:26:53
112.85.42.232 attackspam
...
2019-12-29 21:24:17
42.63.245.98 attackspambots
" "
2019-12-29 21:42:59
116.86.13.226 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-29 21:39:39
125.165.192.138 attackspambots
Scanning random ports - tries to find possible vulnerable services
2019-12-29 21:28:19
119.235.24.244 attack
Dec 29 13:01:01 [snip] sshd[10457]: Invalid user ching from 119.235.24.244 port 59410
Dec 29 13:01:01 [snip] sshd[10457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.235.24.244
Dec 29 13:01:03 [snip] sshd[10457]: Failed password for invalid user ching from 119.235.24.244 port 59410 ssh2[...]
2019-12-29 21:47:39
213.85.3.250 attack
Dec 29 14:32:10 * sshd[17194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.85.3.250
Dec 29 14:32:12 * sshd[17194]: Failed password for invalid user webadmin from 213.85.3.250 port 43100 ssh2
2019-12-29 21:42:21
178.128.215.16 attack
Dec 29 13:18:31 server sshd\[2104\]: Invalid user 1111111 from 178.128.215.16
Dec 29 13:18:31 server sshd\[2104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.215.16 
Dec 29 13:18:33 server sshd\[2104\]: Failed password for invalid user 1111111 from 178.128.215.16 port 55368 ssh2
Dec 29 13:19:12 server sshd\[2201\]: Invalid user jainaryan from 178.128.215.16
Dec 29 13:19:12 server sshd\[2201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.215.16 
...
2019-12-29 21:33:26
1.82.36.163 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-29 21:45:41

Recently Reported IPs

196.95.92.113 44.16.112.242 72.149.8.134 89.24.160.186
60.106.215.11 190.14.2.193 25.26.117.233 152.88.85.239
68.0.243.62 194.252.175.129 229.81.42.157 198.54.124.116
15.221.213.21 243.18.106.249 167.175.18.91 174.15.150.169
117.251.53.81 30.217.169.93 229.180.116.93 245.144.194.90