Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.44.115.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42249
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.44.115.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011600 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 16 16:16:48 CST 2025
;; MSG SIZE  rcvd: 107
Host info
214.115.44.214.in-addr.arpa is an alias for 254.255.44.214.in-addr.arpa.
254.255.44.214.in-addr.arpa domain name pointer 214-44-host.usmc.mil.
Nslookup info:
server can't find 214.44.115.214.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
5.1.88.50 attack
SSH Brute-Force attacks
2019-08-31 18:04:45
58.57.182.202 attack
Unauthorized connection attempt from IP address 58.57.182.202 on Port 445(SMB)
2019-08-31 18:21:33
79.1.212.37 attack
Aug 31 01:17:24 ny01 sshd[6695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.1.212.37
Aug 31 01:17:25 ny01 sshd[6695]: Failed password for invalid user airquality from 79.1.212.37 port 62777 ssh2
Aug 31 01:21:32 ny01 sshd[7334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.1.212.37
2019-08-31 18:31:55
212.59.17.180 attackspam
Aug 31 07:09:22 taivassalofi sshd[2793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.59.17.180
Aug 31 07:09:24 taivassalofi sshd[2793]: Failed password for invalid user moon from 212.59.17.180 port 51677 ssh2
...
2019-08-31 17:38:05
1.53.182.2 attackspambots
firewall-block, port(s): 445/tcp
2019-08-31 18:28:36
31.208.65.235 attackbots
ssh failed login
2019-08-31 18:08:41
202.21.113.238 attackbotsspam
Unauthorized connection attempt from IP address 202.21.113.238 on Port 445(SMB)
2019-08-31 17:57:19
205.185.117.149 attackbots
Unauthorized SSH login attempts
2019-08-31 17:14:56
218.156.38.130 attackbotsspam
Unauthorised access (Aug 31) SRC=218.156.38.130 LEN=40 TTL=52 ID=52000 TCP DPT=23 WINDOW=18265 SYN
2019-08-31 17:22:22
171.229.242.104 attackbots
Unauthorized connection attempt from IP address 171.229.242.104 on Port 445(SMB)
2019-08-31 17:44:43
171.25.193.25 attackspam
Aug 31 10:56:22 rotator sshd\[16475\]: Failed password for root from 171.25.193.25 port 38176 ssh2Aug 31 10:56:24 rotator sshd\[16475\]: Failed password for root from 171.25.193.25 port 38176 ssh2Aug 31 10:56:27 rotator sshd\[16475\]: Failed password for root from 171.25.193.25 port 38176 ssh2Aug 31 10:56:30 rotator sshd\[16475\]: Failed password for root from 171.25.193.25 port 38176 ssh2Aug 31 10:56:32 rotator sshd\[16475\]: Failed password for root from 171.25.193.25 port 38176 ssh2Aug 31 10:56:34 rotator sshd\[16475\]: Failed password for root from 171.25.193.25 port 38176 ssh2
...
2019-08-31 17:28:12
173.45.164.2 attackspam
Invalid user bird from 173.45.164.2 port 52354
2019-08-31 17:23:19
190.215.57.118 attack
Unauthorized connection attempt from IP address 190.215.57.118 on Port 445(SMB)
2019-08-31 17:29:37
186.23.246.50 attackspam
Invalid user kk from 186.23.246.50 port 50338
2019-08-31 17:54:29
117.4.138.235 attackspam
Unauthorized connection attempt from IP address 117.4.138.235 on Port 445(SMB)
2019-08-31 18:00:09

Recently Reported IPs

41.242.182.73 104.206.206.7 202.159.119.81 69.98.52.124
177.196.254.138 116.248.203.81 226.85.180.89 200.57.101.34
134.157.113.163 47.74.19.20 89.141.230.90 230.128.9.100
62.47.71.33 41.8.210.222 238.97.42.183 69.95.155.226
6.32.12.87 240.177.170.140 8.65.189.111 85.175.232.27