Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.3.14.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30900
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.3.14.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 23:25:47 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 53.14.3.214.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 214.3.14.53.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
168.194.207.58 attackspam
2020-08-27 23:16:06 server sshd[30056]: Failed password for invalid user admin from 168.194.207.58 port 39644 ssh2
2020-08-29 01:59:42
164.163.167.2 attackbots
Spam from accdeptfedminagric.*
2020-08-29 02:11:12
218.92.0.185 attack
Aug 28 19:06:10 rocket sshd[26584]: Failed password for root from 218.92.0.185 port 35990 ssh2
Aug 28 19:06:23 rocket sshd[26584]: error: maximum authentication attempts exceeded for root from 218.92.0.185 port 35990 ssh2 [preauth]
...
2020-08-29 02:15:00
83.103.98.211 attack
Aug 28 20:23:41 electroncash sshd[20818]: Failed password for invalid user ubuntu from 83.103.98.211 port 17014 ssh2
Aug 28 20:27:55 electroncash sshd[21967]: Invalid user lg from 83.103.98.211 port 15947
Aug 28 20:27:55 electroncash sshd[21967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.103.98.211 
Aug 28 20:27:55 electroncash sshd[21967]: Invalid user lg from 83.103.98.211 port 15947
Aug 28 20:27:57 electroncash sshd[21967]: Failed password for invalid user lg from 83.103.98.211 port 15947 ssh2
...
2020-08-29 02:35:41
68.183.90.130 attackbots
Aug 28 18:33:29 ovpn sshd\[16305\]: Invalid user user from 68.183.90.130
Aug 28 18:33:29 ovpn sshd\[16305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.90.130
Aug 28 18:33:32 ovpn sshd\[16305\]: Failed password for invalid user user from 68.183.90.130 port 54418 ssh2
Aug 28 18:42:06 ovpn sshd\[18409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.90.130  user=root
Aug 28 18:42:08 ovpn sshd\[18409\]: Failed password for root from 68.183.90.130 port 60274 ssh2
2020-08-29 02:32:09
119.2.17.138 attackspambots
Time:     Fri Aug 28 14:21:58 2020 +0000
IP:       119.2.17.138 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 28 14:03:40 hosting sshd[14549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.2.17.138  user=root
Aug 28 14:03:42 hosting sshd[14549]: Failed password for root from 119.2.17.138 port 33906 ssh2
Aug 28 14:19:18 hosting sshd[16784]: Invalid user anirudh from 119.2.17.138 port 50992
Aug 28 14:19:21 hosting sshd[16784]: Failed password for invalid user anirudh from 119.2.17.138 port 50992 ssh2
Aug 28 14:21:55 hosting sshd[17119]: Invalid user teamspeak3 from 119.2.17.138 port 49450
2020-08-29 02:35:20
97.74.237.196 attackbots
SSH Brute-Force Attack
2020-08-29 02:25:48
189.240.225.205 attackbots
2020-08-28T19:30:42.390074mail.broermann.family sshd[9237]: Invalid user aaaaa from 189.240.225.205 port 37212
2020-08-28T19:30:42.394506mail.broermann.family sshd[9237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.240.225.205
2020-08-28T19:30:42.390074mail.broermann.family sshd[9237]: Invalid user aaaaa from 189.240.225.205 port 37212
2020-08-28T19:30:43.920991mail.broermann.family sshd[9237]: Failed password for invalid user aaaaa from 189.240.225.205 port 37212 ssh2
2020-08-28T19:34:19.304367mail.broermann.family sshd[9360]: Invalid user cs from 189.240.225.205 port 44342
...
2020-08-29 02:16:45
51.68.251.202 attackbots
2020-08-28T11:19:46.711437sorsha.thespaminator.com sshd[543]: Invalid user jds from 51.68.251.202 port 52692
2020-08-28T11:19:48.921130sorsha.thespaminator.com sshd[543]: Failed password for invalid user jds from 51.68.251.202 port 52692 ssh2
...
2020-08-29 02:21:53
123.11.122.152 attackspambots
Port probing on unauthorized port 23
2020-08-29 02:17:31
180.76.177.237 attackbots
2020-08-28T17:52:52.423221abusebot.cloudsearch.cf sshd[2361]: Invalid user marieke from 180.76.177.237 port 60348
2020-08-28T17:52:52.427238abusebot.cloudsearch.cf sshd[2361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.177.237
2020-08-28T17:52:52.423221abusebot.cloudsearch.cf sshd[2361]: Invalid user marieke from 180.76.177.237 port 60348
2020-08-28T17:52:54.536248abusebot.cloudsearch.cf sshd[2361]: Failed password for invalid user marieke from 180.76.177.237 port 60348 ssh2
2020-08-28T17:57:19.517293abusebot.cloudsearch.cf sshd[2413]: Invalid user anna from 180.76.177.237 port 59136
2020-08-28T17:57:19.522264abusebot.cloudsearch.cf sshd[2413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.177.237
2020-08-28T17:57:19.517293abusebot.cloudsearch.cf sshd[2413]: Invalid user anna from 180.76.177.237 port 59136
2020-08-28T17:57:21.956681abusebot.cloudsearch.cf sshd[2413]: Failed password for
...
2020-08-29 02:23:22
51.178.43.9 attackbots
Aug 28 19:23:03 vpn01 sshd[27480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.43.9
Aug 28 19:23:05 vpn01 sshd[27480]: Failed password for invalid user sekretariat from 51.178.43.9 port 50112 ssh2
...
2020-08-29 02:19:06
157.245.43.135 attackspam
port scan and connect, tcp 8000 (http-alt)
2020-08-29 02:00:12
138.68.178.64 attack
Aug 28 18:16:47 scw-focused-cartwright sshd[10733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.178.64
Aug 28 18:16:49 scw-focused-cartwright sshd[10733]: Failed password for invalid user huawei from 138.68.178.64 port 51162 ssh2
2020-08-29 02:25:01
139.59.3.170 attackbots
Aug 28 16:42:55 havingfunrightnow sshd[10062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.3.170 
Aug 28 16:42:57 havingfunrightnow sshd[10062]: Failed password for invalid user shimada from 139.59.3.170 port 34760 ssh2
Aug 28 16:55:43 havingfunrightnow sshd[10325]: Failed password for root from 139.59.3.170 port 44250 ssh2
...
2020-08-29 02:03:27

Recently Reported IPs

142.80.184.137 212.161.27.142 147.153.53.127 221.99.1.15
20.162.157.54 154.213.18.173 30.88.33.134 165.250.78.223
201.200.116.243 142.131.52.108 162.149.130.207 138.208.123.145
147.145.110.53 123.151.59.86 65.106.32.97 135.156.251.148
213.22.141.178 70.117.18.210 24.251.55.161 211.157.252.243