Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.75.171.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8157
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.75.171.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 101 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 21:51:41 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 104.171.75.214.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 214.75.171.104.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
77.222.117.61 attackspambots
Honeypot attack, port: 445, PTR: pool-77-222-117-61.is74.ru.
2020-09-07 15:52:26
209.141.6.123 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 16:04:07
185.158.142.144 attack
Honeypot attack, port: 445, PTR: 144-142-158-185.wifi4all.it.
2020-09-07 15:57:54
154.221.28.224 attackbots
$f2bV_matches
2020-09-07 16:19:49
64.132.150.35 attackbots
Honeypot attack, port: 445, PTR: barracuda.gipath.com.
2020-09-07 16:11:56
103.240.96.233 attackspam
DDOS
2020-09-07 16:13:13
171.34.173.17 attackspambots
...
2020-09-07 16:24:14
104.131.15.189 attackbotsspam
Sep  7 09:37:56 Ubuntu-1404-trusty-64-minimal sshd\[19663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.15.189  user=root
Sep  7 09:37:58 Ubuntu-1404-trusty-64-minimal sshd\[19663\]: Failed password for root from 104.131.15.189 port 37327 ssh2
Sep  7 09:49:18 Ubuntu-1404-trusty-64-minimal sshd\[28371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.15.189  user=root
Sep  7 09:49:21 Ubuntu-1404-trusty-64-minimal sshd\[28371\]: Failed password for root from 104.131.15.189 port 42762 ssh2
Sep  7 09:56:40 Ubuntu-1404-trusty-64-minimal sshd\[1801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.15.189  user=root
2020-09-07 16:24:51
188.165.230.118 attackspam
Wordpress File Manager Plugin Remote Code Execution Vulnerability
2020-09-07 15:58:23
174.138.43.162 attack
2020-09-07T10:04:28.933065ks3355764 sshd[18142]: Invalid user nexus from 174.138.43.162 port 59890
2020-09-07T10:04:30.922602ks3355764 sshd[18142]: Failed password for invalid user nexus from 174.138.43.162 port 59890 ssh2
...
2020-09-07 16:14:48
91.135.193.146 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 16:09:30
180.250.108.130 attack
" "
2020-09-07 16:22:43
158.69.163.156 attack
DIS,DEF GET /joomla/administrator
2020-09-07 15:56:13
115.182.105.68 attackspambots
SSH Brute Force
2020-09-07 15:51:38
123.30.249.49 attackspambots
$f2bV_matches
2020-09-07 15:51:50

Recently Reported IPs

159.212.22.20 196.177.151.42 160.173.117.149 90.233.201.22
37.109.45.57 19.212.101.204 211.54.14.9 68.235.157.48
86.6.181.251 74.68.49.88 153.154.49.53 5.59.255.195
99.243.179.231 207.130.61.129 229.247.103.127 172.13.45.191
65.180.87.31 27.14.205.60 253.175.9.199 132.172.103.230