Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 32.214.211.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50409
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;32.214.211.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 00:00:34 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 54.211.214.32.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.211.214.32.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.176.27.34 attack
05/02/2020-10:03:55.825106 185.176.27.34 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-02 22:08:45
120.92.151.17 attack
May  2 15:09:57 srv-ubuntu-dev3 sshd[73220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.151.17  user=root
May  2 15:09:59 srv-ubuntu-dev3 sshd[73220]: Failed password for root from 120.92.151.17 port 33542 ssh2
May  2 15:15:03 srv-ubuntu-dev3 sshd[73993]: Invalid user beth from 120.92.151.17
May  2 15:15:03 srv-ubuntu-dev3 sshd[73993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.151.17
May  2 15:15:03 srv-ubuntu-dev3 sshd[73993]: Invalid user beth from 120.92.151.17
May  2 15:15:05 srv-ubuntu-dev3 sshd[73993]: Failed password for invalid user beth from 120.92.151.17 port 49600 ssh2
May  2 15:19:43 srv-ubuntu-dev3 sshd[74720]: Invalid user ubuntu from 120.92.151.17
May  2 15:19:43 srv-ubuntu-dev3 sshd[74720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.151.17
May  2 15:19:43 srv-ubuntu-dev3 sshd[74720]: Invalid user ubuntu from 120.92.
...
2020-05-02 22:23:06
132.232.49.143 attackbotsspam
May  2 14:08:47 piServer sshd[3603]: Failed password for root from 132.232.49.143 port 45614 ssh2
May  2 14:14:15 piServer sshd[4166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.49.143 
May  2 14:14:16 piServer sshd[4166]: Failed password for invalid user mc from 132.232.49.143 port 55730 ssh2
...
2020-05-02 21:56:29
128.199.204.26 attackspambots
May  2 06:53:57 server1 sshd\[27899\]: Invalid user kshitiz from 128.199.204.26
May  2 06:53:57 server1 sshd\[27899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.204.26 
May  2 06:53:59 server1 sshd\[27899\]: Failed password for invalid user kshitiz from 128.199.204.26 port 46942 ssh2
May  2 06:59:45 server1 sshd\[2186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.204.26  user=root
May  2 06:59:47 server1 sshd\[2186\]: Failed password for root from 128.199.204.26 port 42534 ssh2
...
2020-05-02 22:09:32
36.110.217.140 attackspam
...
2020-05-02 22:24:07
66.70.130.149 attackspam
May  2 09:13:26 vps46666688 sshd[25600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.130.149
May  2 09:13:28 vps46666688 sshd[25600]: Failed password for invalid user edmond from 66.70.130.149 port 48404 ssh2
...
2020-05-02 22:36:40
201.49.127.212 attack
May  2 14:02:41 ns382633 sshd\[637\]: Invalid user two from 201.49.127.212 port 58674
May  2 14:02:41 ns382633 sshd\[637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.49.127.212
May  2 14:02:43 ns382633 sshd\[637\]: Failed password for invalid user two from 201.49.127.212 port 58674 ssh2
May  2 14:13:29 ns382633 sshd\[2801\]: Invalid user kt from 201.49.127.212 port 49762
May  2 14:13:29 ns382633 sshd\[2801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.49.127.212
2020-05-02 22:31:57
192.223.27.100 attackspambots
[Sat Apr 18 01:34:11 2020] - Syn Flood From IP: 192.223.27.100 Port: 20752
2020-05-02 22:28:27
200.196.253.251 attackbotsspam
2020-05-02T15:42:33.741028vps773228.ovh.net sshd[16921]: Failed password for invalid user paulo from 200.196.253.251 port 48884 ssh2
2020-05-02T15:46:07.864390vps773228.ovh.net sshd[16998]: Invalid user admin from 200.196.253.251 port 50860
2020-05-02T15:46:07.887100vps773228.ovh.net sshd[16998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.196.253.251
2020-05-02T15:46:07.864390vps773228.ovh.net sshd[16998]: Invalid user admin from 200.196.253.251 port 50860
2020-05-02T15:46:09.806563vps773228.ovh.net sshd[16998]: Failed password for invalid user admin from 200.196.253.251 port 50860 ssh2
...
2020-05-02 21:51:35
103.108.87.161 attackspambots
May  2 14:24:56 dev0-dcde-rnet sshd[5102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.108.87.161
May  2 14:24:58 dev0-dcde-rnet sshd[5102]: Failed password for invalid user ghost from 103.108.87.161 port 37436 ssh2
May  2 14:32:12 dev0-dcde-rnet sshd[5165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.108.87.161
2020-05-02 22:01:52
112.85.42.178 attackspambots
Brute-force attempt banned
2020-05-02 22:39:00
203.162.13.68 attackbots
May  2 16:18:11 v22018086721571380 sshd[19870]: Failed password for invalid user kiran from 203.162.13.68 port 50704 ssh2
2020-05-02 22:25:51
62.210.125.29 attack
May  2 14:14:05 electroncash sshd[8186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.125.29 
May  2 14:14:05 electroncash sshd[8186]: Invalid user suporte from 62.210.125.29 port 55008
May  2 14:14:06 electroncash sshd[8186]: Failed password for invalid user suporte from 62.210.125.29 port 55008 ssh2
May  2 14:17:35 electroncash sshd[9081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.125.29  user=root
May  2 14:17:38 electroncash sshd[9081]: Failed password for root from 62.210.125.29 port 37048 ssh2
...
2020-05-02 22:37:50
157.245.110.16 attackspam
CMS (WordPress or Joomla) login attempt.
2020-05-02 22:20:18
222.186.173.154 attackbotsspam
May  2 20:53:20 webhost01 sshd[29902]: Failed password for root from 222.186.173.154 port 6104 ssh2
May  2 20:53:34 webhost01 sshd[29902]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 6104 ssh2 [preauth]
...
2020-05-02 21:54:43

Recently Reported IPs

186.184.99.145 125.91.189.161 173.29.132.71 99.2.237.217
14.13.199.158 52.171.79.243 96.128.22.162 42.123.235.56
190.118.137.124 253.113.246.121 182.171.158.182 247.78.171.7
201.5.47.222 125.160.169.209 243.131.17.67 170.186.174.26
210.152.207.107 166.220.220.53 197.86.248.255 221.156.131.247