Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.214.50.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.214.50.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 23:44:41 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 106.50.214.221.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.50.214.221.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.234.126.244 attackspam
[Mon Sep 28 09:51:34 2020] 49.234.126.244
...
2020-09-28 22:46:31
115.238.181.22 attackbots
Sep 28 10:28:31 ws24vmsma01 sshd[187688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.181.22
Sep 28 10:28:34 ws24vmsma01 sshd[187688]: Failed password for invalid user newuser from 115.238.181.22 port 53834 ssh2
...
2020-09-28 22:52:37
14.18.154.186 attack
fail2ban -- 14.18.154.186
...
2020-09-28 22:41:25
95.107.53.155 attack
Automatic report - Banned IP Access
2020-09-28 23:00:44
192.241.223.72 attackbotsspam
firewall-block, port(s): 27017/tcp
2020-09-28 23:06:48
46.37.188.139 attackbots
Sep 28 14:11:05 ajax sshd[3640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.37.188.139 
Sep 28 14:11:06 ajax sshd[3640]: Failed password for invalid user julien from 46.37.188.139 port 37342 ssh2
2020-09-28 22:37:33
211.38.132.37 attackspam
Sep 28 00:11:58 con01 sshd[197612]: Invalid user mosquitto from 211.38.132.37 port 36094
Sep 28 00:11:58 con01 sshd[197612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.38.132.37 
Sep 28 00:11:58 con01 sshd[197612]: Invalid user mosquitto from 211.38.132.37 port 36094
Sep 28 00:12:01 con01 sshd[197612]: Failed password for invalid user mosquitto from 211.38.132.37 port 36094 ssh2
Sep 28 00:16:03 con01 sshd[205394]: Invalid user centos from 211.38.132.37 port 43062
...
2020-09-28 22:40:51
82.64.153.14 attackbots
Time:     Sun Sep 27 11:28:33 2020 +0000
IP:       82.64.153.14 (FR/France/82-64-153-14.subs.proxad.net)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 27 11:24:48 3 sshd[22524]: Invalid user carlos from 82.64.153.14 port 58290
Sep 27 11:24:50 3 sshd[22524]: Failed password for invalid user carlos from 82.64.153.14 port 58290 ssh2
Sep 27 11:27:32 3 sshd[28992]: Invalid user sabnzbd from 82.64.153.14 port 53828
Sep 27 11:27:35 3 sshd[28992]: Failed password for invalid user sabnzbd from 82.64.153.14 port 53828 ssh2
Sep 27 11:28:31 3 sshd[31379]: Invalid user deploy from 82.64.153.14 port 47170
2020-09-28 22:37:18
78.199.19.89 attackbots
prod8
...
2020-09-28 23:02:28
51.158.104.101 attackbotsspam
Sep 28 13:46:30 mavik sshd[583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.104.101
Sep 28 13:46:31 mavik sshd[583]: Failed password for invalid user erika from 51.158.104.101 port 45458 ssh2
Sep 28 13:50:22 mavik sshd[715]: Invalid user mon from 51.158.104.101
Sep 28 13:50:22 mavik sshd[715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.104.101
Sep 28 13:50:24 mavik sshd[715]: Failed password for invalid user mon from 51.158.104.101 port 55682 ssh2
...
2020-09-28 22:59:08
188.166.254.95 attack
188.166.254.95 (SG/Singapore/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 28 08:35:58 server5 sshd[20934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.177.20.50  user=root
Sep 28 08:36:00 server5 sshd[20934]: Failed password for root from 116.177.20.50 port 13263 ssh2
Sep 28 08:44:37 server5 sshd[24537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.254.95  user=root
Sep 28 08:37:00 server5 sshd[21320]: Failed password for root from 5.196.1.250 port 50848 ssh2
Sep 28 08:38:55 server5 sshd[22150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.62.150  user=root
Sep 28 08:38:57 server5 sshd[22150]: Failed password for root from 129.226.62.150 port 35530 ssh2

IP Addresses Blocked:

116.177.20.50 (CN/China/-)
2020-09-28 22:31:37
52.13.201.144 attackspam
Time:     Sun Sep 27 14:35:47 2020 +0000
IP:       52.13.201.144 (US/United States/ec2-52-13-201-144.us-west-2.compute.amazonaws.com)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 27 14:28:35 3 sshd[3144]: Invalid user bitnami from 52.13.201.144 port 48248
Sep 27 14:28:37 3 sshd[3144]: Failed password for invalid user bitnami from 52.13.201.144 port 48248 ssh2
Sep 27 14:33:15 3 sshd[17099]: Invalid user cs from 52.13.201.144 port 46996
Sep 27 14:35:39 3 sshd[27226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.13.201.144  user=root
Sep 27 14:35:42 3 sshd[27226]: Failed password for root from 52.13.201.144 port 46370 ssh2
2020-09-28 22:31:01
106.75.132.3 attackspambots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-28T11:36:41Z and 2020-09-28T11:40:01Z
2020-09-28 22:32:33
82.64.132.50 attackbotsspam
s2.hscode.pl - SSH Attack
2020-09-28 22:42:16
101.36.110.20 attackspam
Time:     Sat Sep 26 21:58:24 2020 +0000
IP:       101.36.110.20 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 26 21:55:04 activeserver sshd[20051]: Invalid user dev from 101.36.110.20 port 48852
Sep 26 21:55:06 activeserver sshd[20051]: Failed password for invalid user dev from 101.36.110.20 port 48852 ssh2
Sep 26 21:56:41 activeserver sshd[24032]: Invalid user bot from 101.36.110.20 port 60374
Sep 26 21:56:43 activeserver sshd[24032]: Failed password for invalid user bot from 101.36.110.20 port 60374 ssh2
Sep 26 21:58:20 activeserver sshd[27918]: Invalid user ftpusr from 101.36.110.20 port 43696
2020-09-28 22:35:10

Recently Reported IPs

115.255.44.171 215.70.24.191 136.99.139.6 68.21.137.80
213.44.65.33 176.204.15.164 130.142.209.254 75.77.113.150
31.206.177.142 230.193.99.227 132.115.226.218 148.104.166.116
103.3.251.193 186.53.164.39 213.19.90.135 8.185.179.84
157.165.197.83 117.93.74.49 37.214.228.142 187.120.105.167