Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.41.47.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15901
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.41.47.1.			IN	A

;; AUTHORITY SECTION:
.			539	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011600 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 16 16:15:14 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 1.47.41.214.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 214.41.47.1.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
159.203.77.51 attackspam
Jul 29 08:52:32 mail sshd[25495]: Invalid user applmgr from 159.203.77.51
...
2019-07-29 15:52:15
115.165.0.224 attackspambots
SSH Brute-Forcing (ownc)
2019-07-29 16:06:17
77.243.191.40 attackspam
Spam-Mail via Contact-Form 29.07.2019 / 03:38
IP-Adresse    | 77.243.191.40
2019-07-29 16:31:42
176.119.158.72 attackspam
SSH/22 MH Probe, BF, Hack -
2019-07-29 16:20:51
173.249.35.213 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-07-29 16:27:08
175.141.220.169 attack
SSH/22 MH Probe, BF, Hack -
2019-07-29 16:24:25
122.228.19.80 attackbotsspam
[portscan] tcp/111 [ONC RPC]
[portscan] tcp/23 [TELNET]
[IPBX probe: SIP=tcp/5061]
[portscan] tcp/85 [mit-ml-dev]
[scan/connect: 4 time(s)]
*(RWIN=29200)(07291128)
2019-07-29 16:41:15
173.71.216.135 attack
Scanning random ports - tries to find possible vulnerable services
2019-07-29 16:25:46
54.38.82.14 attackspambots
Jul 29 04:42:45 vps200512 sshd\[31357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14  user=root
Jul 29 04:42:47 vps200512 sshd\[31357\]: Failed password for root from 54.38.82.14 port 59001 ssh2
Jul 29 04:42:47 vps200512 sshd\[31359\]: Invalid user admin from 54.38.82.14
Jul 29 04:42:47 vps200512 sshd\[31359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14
Jul 29 04:42:50 vps200512 sshd\[31359\]: Failed password for invalid user admin from 54.38.82.14 port 53803 ssh2
2019-07-29 16:49:54
131.100.78.83 attack
failed_logins
2019-07-29 15:54:19
178.128.195.6 attack
Jul 29 09:06:07 arianus sshd\[22984\]: User root from 178.128.195.6 not allowed because none of user's groups are listed in AllowGroups
...
2019-07-29 15:56:32
159.65.6.57 attackbots
Jul 29 08:52:22 mout sshd[11572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.6.57  user=root
Jul 29 08:52:24 mout sshd[11572]: Failed password for root from 159.65.6.57 port 51736 ssh2
2019-07-29 15:59:16
62.4.13.108 attackbots
Brute force attempt
2019-07-29 16:34:52
154.41.4.130 attackbots
Automatic report - Port Scan Attack
2019-07-29 16:21:33
153.126.200.92 attack
Jul 29 08:56:03 mail sshd\[1273\]: Failed password for invalid user dns021idc from 153.126.200.92 port 51620 ssh2
Jul 29 09:12:10 mail sshd\[1488\]: Invalid user Pass@6tfc from 153.126.200.92 port 41174
...
2019-07-29 16:13:14

Recently Reported IPs

139.73.32.180 225.113.105.112 122.30.255.156 38.35.114.173
211.195.203.13 99.9.17.26 10.114.3.207 202.143.17.71
77.5.209.190 17.211.133.198 4.203.100.103 14.19.173.222
14.190.37.204 94.220.85.34 140.58.68.187 130.137.111.190
80.174.174.30 141.160.97.28 57.79.45.181 142.84.207.25