Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.55.138.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29239
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;214.55.138.211.			IN	A

;; AUTHORITY SECTION:
.			390	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100301 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 04 11:02:18 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 211.138.55.214.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 211.138.55.214.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
1.160.33.180 attackspambots
 TCP (SYN) 1.160.33.180:36695 -> port 23, len 40
2020-07-01 12:06:55
81.94.255.12 attack
Invalid user tang from 81.94.255.12 port 57352
2020-07-01 10:51:27
220.133.209.230 attackspam
Telnet Server BruteForce Attack
2020-07-01 12:07:16
185.46.197.107 attack
Apr 24 09:21:09 debian-2gb-nbg1-2 kernel: \[9971814.623159\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.46.197.107 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=16452 DF PROTO=TCP SPT=13130 DPT=23 WINDOW=14600 RES=0x00 SYN URGP=0
2020-07-01 12:34:21
218.156.38.158 attackspambots
firewall-block, port(s): 23/tcp
2020-07-01 12:04:58
120.198.126.181 attack
Dovecot Invalid User Login Attempt.
2020-07-01 12:13:43
201.234.195.154 attackspam
Unauthorized connection attempt detected from IP address 201.234.195.154 to port 3389
2020-07-01 12:27:51
193.46.77.209 attack
Unauthorized connection attempt detected from IP address 193.46.77.209 to port 445 [T]
2020-07-01 12:03:31
177.67.15.239 attackbotsspam
 TCP (SYN) 177.67.15.239:38726 -> port 8080, len 44
2020-07-01 12:16:56
202.88.216.242 attackspambots
 TCP (SYN) 202.88.216.242:58627 -> port 23, len 44
2020-07-01 12:33:22
124.10.144.10 attackspam
Honeypot attack, port: 81, PTR: 124-10-144-10.static.tfn.net.tw.
2020-07-01 12:04:26
111.229.232.224 attackspambots
Jun 30 05:10:21 scw-tender-jepsen sshd[3435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.232.224
Jun 30 05:10:23 scw-tender-jepsen sshd[3435]: Failed password for invalid user zhicheng from 111.229.232.224 port 50890 ssh2
2020-07-01 10:45:46
200.113.61.52 attack
[portscan] tcp/23 [TELNET]
*(RWIN=51615)(06281032)
2020-07-01 12:33:52
141.98.9.157 attack
Brute-force attempt banned
2020-07-01 12:37:34
211.253.129.225 attackbotsspam
Multiple SSH authentication failures from 211.253.129.225
2020-07-01 12:36:16

Recently Reported IPs

103.6.143.110 221.47.155.152 222.237.136.85 32.91.34.40
134.163.170.163 142.24.53.243 89.215.104.199 28.62.231.53
47.107.228.176 230.64.244.36 53.121.62.138 209.99.33.79
31.183.171.61 35.212.151.28 142.87.155.237 103.195.165.203
95.107.229.143 25.21.225.199 75.151.25.165 177.148.112.119