Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.97.66.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49604
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.97.66.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 20:19:13 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 212.66.97.214.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 214.97.66.212.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
46.38.150.153 attackbots
2020-06-22 13:20:59 auth_plain authenticator failed for (User) [46.38.150.153]: 535 Incorrect authentication data (set_id=yourmail@csmailer.org)
2020-06-22 13:21:59 SMTP protocol synchronization error (input sent without waiting for greeting): rejected connection from H=[46.38.150.153] input="QUIT
"
2020-06-22 13:22:00 auth_plain authenticator failed for (User) [46.38.150.153]: 535 Incorrect authentication data (set_id=rupesh@csmailer.org)
2020-06-22 13:22:30 auth_plain authenticator failed for (User) [46.38.150.153]: 535 Incorrect authentication data (set_id=egroupware@csmailer.org)
2020-06-22 13:23:28 auth_plain authenticator failed for (User) [46.38.150.153]: 535 Incorrect authentication data (set_id=photography@csmailer.org)
...
2020-06-22 21:28:26
185.110.95.6 attackspam
Jun 22 14:04:15 rocket sshd[24397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.110.95.6
Jun 22 14:04:17 rocket sshd[24397]: Failed password for invalid user vnc from 185.110.95.6 port 45466 ssh2
...
2020-06-22 21:18:00
222.186.52.39 attackspam
2020-06-22T16:38:27.576873lavrinenko.info sshd[14428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.39  user=root
2020-06-22T16:38:29.985446lavrinenko.info sshd[14428]: Failed password for root from 222.186.52.39 port 26502 ssh2
2020-06-22T16:38:33.244286lavrinenko.info sshd[14428]: Failed password for root from 222.186.52.39 port 26502 ssh2
2020-06-22T16:38:44.127049lavrinenko.info sshd[14430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.39  user=root
2020-06-22T16:38:46.535546lavrinenko.info sshd[14430]: Failed password for root from 222.186.52.39 port 20446 ssh2
...
2020-06-22 21:41:07
218.92.0.219 attackbotsspam
Jun 22 03:13:31 web9 sshd\[13940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.219  user=root
Jun 22 03:13:33 web9 sshd\[13940\]: Failed password for root from 218.92.0.219 port 37693 ssh2
Jun 22 03:13:35 web9 sshd\[13940\]: Failed password for root from 218.92.0.219 port 37693 ssh2
Jun 22 03:13:37 web9 sshd\[13940\]: Failed password for root from 218.92.0.219 port 37693 ssh2
Jun 22 03:13:40 web9 sshd\[13962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.219  user=root
2020-06-22 21:14:10
49.114.143.90 attackspambots
Jun 22 12:05:12 onepixel sshd[658590]: Invalid user gy from 49.114.143.90 port 54982
Jun 22 12:05:12 onepixel sshd[658590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.114.143.90 
Jun 22 12:05:12 onepixel sshd[658590]: Invalid user gy from 49.114.143.90 port 54982
Jun 22 12:05:14 onepixel sshd[658590]: Failed password for invalid user gy from 49.114.143.90 port 54982 ssh2
Jun 22 12:07:05 onepixel sshd[660093]: Invalid user valentin from 49.114.143.90 port 46738
2020-06-22 21:28:03
218.92.0.249 attack
Jun 22 15:28:23 server sshd[27084]: Failed none for root from 218.92.0.249 port 23851 ssh2
Jun 22 15:28:26 server sshd[27084]: Failed password for root from 218.92.0.249 port 23851 ssh2
Jun 22 15:28:31 server sshd[27084]: Failed password for root from 218.92.0.249 port 23851 ssh2
2020-06-22 21:43:42
3.82.61.205 attackspambots
Hit honeypot r.
2020-06-22 21:12:59
27.221.97.4 attackspam
Jun 22 02:31:10 web1 sshd\[29938\]: Invalid user shop1 from 27.221.97.4
Jun 22 02:31:10 web1 sshd\[29938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.221.97.4
Jun 22 02:31:12 web1 sshd\[29938\]: Failed password for invalid user shop1 from 27.221.97.4 port 49975 ssh2
Jun 22 02:33:48 web1 sshd\[30137\]: Invalid user monit from 27.221.97.4
Jun 22 02:33:48 web1 sshd\[30137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.221.97.4
2020-06-22 21:23:36
201.47.158.130 attack
2020-06-22T16:11:10.640243afi-git.jinr.ru sshd[18070]: Failed password for admin from 201.47.158.130 port 41596 ssh2
2020-06-22T16:14:17.173922afi-git.jinr.ru sshd[18845]: Invalid user template from 201.47.158.130 port 55432
2020-06-22T16:14:17.177238afi-git.jinr.ru sshd[18845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.47.158.130
2020-06-22T16:14:17.173922afi-git.jinr.ru sshd[18845]: Invalid user template from 201.47.158.130 port 55432
2020-06-22T16:14:19.525553afi-git.jinr.ru sshd[18845]: Failed password for invalid user template from 201.47.158.130 port 55432 ssh2
...
2020-06-22 21:14:33
89.250.175.68 attackbotsspam
Honeypot attack, port: 445, PTR: 59faaf44.mv.ru.
2020-06-22 21:09:38
49.233.197.193 attackspambots
Jun 22 14:55:57 jane sshd[32147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.197.193 
Jun 22 14:55:59 jane sshd[32147]: Failed password for invalid user www from 49.233.197.193 port 45174 ssh2
...
2020-06-22 21:34:43
106.6.100.24 attackspambots
20/6/22@08:47:29: FAIL: Alarm-Network address from=106.6.100.24
...
2020-06-22 21:13:42
193.160.96.162 attackspambots
Lines containing failures of 193.160.96.162
Jun 22 12:28:12 cdb sshd[26824]: Invalid user debian from 193.160.96.162 port 40832
Jun 22 12:28:12 cdb sshd[26824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.160.96.162
Jun 22 12:28:14 cdb sshd[26824]: Failed password for invalid user debian from 193.160.96.162 port 40832 ssh2
Jun 22 12:28:14 cdb sshd[26824]: Received disconnect from 193.160.96.162 port 40832:11: Bye Bye [preauth]
Jun 22 12:28:14 cdb sshd[26824]: Disconnected from invalid user debian 193.160.96.162 port 40832 [preauth]
Jun 22 13:01:42 cdb sshd[31120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.160.96.162  user=r.r
Jun 22 13:01:43 cdb sshd[31120]: Failed password for r.r from 193.160.96.162 port 51266 ssh2
Jun 22 13:01:43 cdb sshd[31120]: Received disconnect from 193.160.96.162 port 51266:11: Bye Bye [preauth]
Jun 22 13:01:43 cdb sshd[31120]: Disconnected from aut........
------------------------------
2020-06-22 21:47:24
180.76.248.194 attackbotsspam
Jun 22 09:07:25 vps46666688 sshd[1850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.248.194
Jun 22 09:07:27 vps46666688 sshd[1850]: Failed password for invalid user mike from 180.76.248.194 port 42376 ssh2
...
2020-06-22 21:07:01
89.43.188.156 attackbotsspam
20/6/22@08:06:45: FAIL: Alarm-Network address from=89.43.188.156
...
2020-06-22 21:45:01

Recently Reported IPs

18.243.221.234 90.230.52.103 146.114.104.25 159.53.66.176
85.16.194.49 77.205.101.73 69.84.58.9 73.217.131.248
129.241.67.192 170.120.127.93 56.255.50.142 40.82.64.1
176.250.29.17 25.127.142.248 114.93.174.158 103.253.19.116
20.68.198.74 128.227.243.176 3.255.107.149 99.20.193.67