Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.6.113.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.6.113.107.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 21:43:46 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 107.113.6.214.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 214.6.113.107.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
49.235.41.58 attackbotsspam
(sshd) Failed SSH login from 49.235.41.58 (CN/China/-): 5 in the last 3600 secs
2020-10-13 16:48:19
194.1.168.36 attackbotsspam
Oct 12 17:41:21 shivevps sshd[15912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.1.168.36  user=www-data
Oct 12 17:41:24 shivevps sshd[15912]: Failed password for www-data from 194.1.168.36 port 45588 ssh2
Oct 12 17:45:50 shivevps sshd[16062]: Invalid user yoshitani from 194.1.168.36 port 52660
...
2020-10-13 16:55:24
54.37.154.113 attackspambots
54.37.154.113 (FR/France/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct 13 02:24:12 server4 sshd[26775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.252.154  user=root
Oct 13 02:21:58 server4 sshd[24871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.153.147  user=root
Oct 13 02:23:22 server4 sshd[26254]: Failed password for root from 54.37.154.113 port 57444 ssh2
Oct 13 02:23:51 server4 sshd[26576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.252.249.73  user=root
Oct 13 02:23:53 server4 sshd[26576]: Failed password for root from 45.252.249.73 port 50650 ssh2
Oct 13 02:22:00 server4 sshd[24871]: Failed password for root from 159.65.153.147 port 40518 ssh2

IP Addresses Blocked:

157.245.252.154 (US/United States/-)
159.65.153.147 (IN/India/-)
2020-10-13 16:47:42
189.101.237.43 attack
Brute%20Force%20SSH
2020-10-13 17:01:00
200.98.129.114 attack
Oct 13 02:03:48 Ubuntu-1404-trusty-64-minimal sshd\[16463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.98.129.114  user=root
Oct 13 02:03:50 Ubuntu-1404-trusty-64-minimal sshd\[16463\]: Failed password for root from 200.98.129.114 port 39707 ssh2
Oct 13 02:21:38 Ubuntu-1404-trusty-64-minimal sshd\[26882\]: Invalid user shimo from 200.98.129.114
Oct 13 02:21:38 Ubuntu-1404-trusty-64-minimal sshd\[26882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.98.129.114
Oct 13 02:21:40 Ubuntu-1404-trusty-64-minimal sshd\[26882\]: Failed password for invalid user shimo from 200.98.129.114 port 36542 ssh2
2020-10-13 17:17:55
46.218.85.122 attack
SSH login attempts.
2020-10-13 16:41:39
218.92.0.145 attackspam
Oct 13 09:55:49 prod4 sshd\[30665\]: Failed password for root from 218.92.0.145 port 40038 ssh2
Oct 13 09:55:52 prod4 sshd\[30665\]: Failed password for root from 218.92.0.145 port 40038 ssh2
Oct 13 09:55:56 prod4 sshd\[30665\]: Failed password for root from 218.92.0.145 port 40038 ssh2
...
2020-10-13 16:45:20
112.172.147.34 attackbots
$f2bV_matches
2020-10-13 16:52:01
121.229.20.121 attackspam
Oct 13 09:16:34 lunarastro sshd[14310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.20.121 
Oct 13 09:16:36 lunarastro sshd[14310]: Failed password for invalid user zero from 121.229.20.121 port 56570 ssh2
2020-10-13 17:15:56
201.72.186.50 attackspambots
Unauthorized connection attempt from IP address 201.72.186.50 on Port 445(SMB)
2020-10-13 17:20:20
202.152.4.202 attack
SSH/22 MH Probe, BF, Hack -
2020-10-13 16:54:52
210.66.115.238 attackbots
ET SCAN Suspicious inbound to MSSQL port 1433
2020-10-13 17:05:41
134.175.236.132 attackspam
Oct 13 07:45:23 *hidden* sshd[44314]: Failed password for invalid user elli from 134.175.236.132 port 41428 ssh2 Oct 13 08:01:25 *hidden* sshd[44633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.236.132 user=root Oct 13 08:01:27 *hidden* sshd[44633]: Failed password for *hidden* from 134.175.236.132 port 56400 ssh2
2020-10-13 16:51:30
91.93.170.220 attack
Automatic report - Banned IP Access
2020-10-13 16:36:33
119.192.206.158 attack
SSH login attempts.
2020-10-13 17:01:40

Recently Reported IPs

26.40.232.164 48.13.248.244 53.183.215.41 53.238.159.73
96.44.5.197 216.218.126.207 24.221.198.144 114.253.56.30
21.150.4.30 173.60.27.46 144.148.248.250 83.122.165.144
177.69.9.79 3.188.161.158 14.156.6.163 84.5.135.247
242.92.255.98 243.118.67.0 251.207.79.9 114.119.241.180