Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.130.17.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36444
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;59.130.17.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 03:33:53 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 214.17.130.59.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.17.130.59.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
85.93.20.150 attackspambots
200815  1:16:11 [Warning] Access denied for user 'root'@'85.93.20.150' (using password: YES)
200815  1:45:51 [Warning] Access denied for user 'root'@'85.93.20.150' (using password: YES)
200815  4:37:57 [Warning] Access denied for user 'root'@'85.93.20.150' (using password: YES)
...
2020-08-15 19:46:38
74.193.12.156 attack
Aug 15 05:47:13 vps2 sshd[3042320]: Invalid user pi from 74.193.12.156 port 55388
Aug 15 05:47:20 vps2 sshd[3042342]: Invalid user pi from 74.193.12.156 port 60194
Aug 15 05:47:26 vps2 sshd[3042362]: Invalid user pi from 74.193.12.156 port 36536
Aug 15 05:47:32 vps2 sshd[3042382]: Invalid user osboxes from 74.193.12.156 port 41344
Aug 15 05:47:38 vps2 sshd[3042404]: Invalid user support from 74.193.12.156 port 46444
Aug 15 05:47:45 vps2 sshd[3042442]: Invalid user netscreen from 74.193.12.156 port 52444
Aug 15 05:47:50 vps2 sshd[3042462]: Invalid user nexthink from 74.193.12.156 port 56616
Aug 15 05:47:56 vps2 sshd[3042482]: Invalid user admin from 74.193.12.156 port 60594
Aug 15 05:48:03 vps2 sshd[3042503]: Invalid user admin from 74.193.12.156 port 37024
Aug 15 05:48:09 vps2 sshd[3042525]: Invalid user admin from 74.193.12.156 port 43278
...
2020-08-15 19:52:30
51.178.28.196 attackbots
Failed password for root from 51.178.28.196 port 33310 ssh2
2020-08-15 19:41:17
139.59.40.240 attackspambots
Aug 15 09:19:31 localhost sshd\[3014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.40.240  user=root
Aug 15 09:19:32 localhost sshd\[3014\]: Failed password for root from 139.59.40.240 port 52390 ssh2
Aug 15 09:32:44 localhost sshd\[3226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.40.240  user=root
...
2020-08-15 19:18:53
185.220.103.4 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-08-15 19:33:18
193.70.88.213 attack
frenzy
2020-08-15 19:20:04
34.96.10.201 attackbotsspam
20 attempts against mh-misbehave-ban on twig
2020-08-15 19:47:45
45.225.160.235 attackbotsspam
Aug 15 10:35:51 Ubuntu-1404-trusty-64-minimal sshd\[17245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.235  user=root
Aug 15 10:35:53 Ubuntu-1404-trusty-64-minimal sshd\[17245\]: Failed password for root from 45.225.160.235 port 36694 ssh2
Aug 15 10:55:10 Ubuntu-1404-trusty-64-minimal sshd\[26683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.235  user=root
Aug 15 10:55:12 Ubuntu-1404-trusty-64-minimal sshd\[26683\]: Failed password for root from 45.225.160.235 port 49446 ssh2
Aug 15 10:59:14 Ubuntu-1404-trusty-64-minimal sshd\[28106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.235  user=root
2020-08-15 19:42:59
182.148.112.4 attack
Aug 15 10:26:05 mail sshd[23486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.112.4  user=root
Aug 15 10:26:07 mail sshd[23486]: Failed password for root from 182.148.112.4 port 47896 ssh2
...
2020-08-15 19:47:24
62.234.68.31 attack
Lines containing failures of 62.234.68.31
Aug 12 05:14:06 shared02 sshd[2635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.68.31  user=r.r
Aug 12 05:14:09 shared02 sshd[2635]: Failed password for r.r from 62.234.68.31 port 52492 ssh2
Aug 12 05:14:09 shared02 sshd[2635]: Received disconnect from 62.234.68.31 port 52492:11: Bye Bye [preauth]
Aug 12 05:14:09 shared02 sshd[2635]: Disconnected from authenticating user r.r 62.234.68.31 port 52492 [preauth]
Aug 12 05:25:01 shared02 sshd[6122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.68.31  user=r.r
Aug 12 05:25:03 shared02 sshd[6122]: Failed password for r.r from 62.234.68.31 port 39424 ssh2
Aug 12 05:25:04 shared02 sshd[6122]: Received disconnect from 62.234.68.31 port 39424:11: Bye Bye [preauth]
Aug 12 05:25:04 shared02 sshd[6122]: Disconnected from authenticating user r.r 62.234.68.31 port 39424 [preauth]
Aug 12 05:29:16........
------------------------------
2020-08-15 19:36:28
141.144.61.39 attackbotsspam
Aug 15 04:49:24 serwer sshd\[5320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.144.61.39  user=root
Aug 15 04:49:27 serwer sshd\[5320\]: Failed password for root from 141.144.61.39 port 15189 ssh2
Aug 15 04:57:35 serwer sshd\[10784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.144.61.39  user=root
...
2020-08-15 19:35:58
160.153.146.1 attack
[N10.H1.VM1] Port Scanner Detected Blocked by UFW
2020-08-15 19:48:15
36.226.128.95 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-15 19:49:02
54.37.66.7 attackbots
Aug 15 06:07:50 serwer sshd\[30527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.66.7  user=root
Aug 15 06:07:52 serwer sshd\[30527\]: Failed password for root from 54.37.66.7 port 44978 ssh2
Aug 15 06:15:36 serwer sshd\[3923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.66.7  user=root
...
2020-08-15 19:17:59
51.171.22.224 attackspambots
[14/Aug/2020 x@x
[14/Aug/2020 x@x
[14/Aug/2020 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=51.171.22.224
2020-08-15 19:28:06

Recently Reported IPs

187.106.224.198 32.129.156.202 72.134.169.146 200.67.103.146
150.69.155.187 208.167.103.187 145.155.107.113 3.107.17.100
243.145.14.216 76.106.158.157 12.74.208.14 24.156.137.213
34.113.119.15 242.19.109.210 30.4.209.189 54.150.154.97
145.183.99.157 59.154.129.96 60.203.159.178 80.193.65.6