Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.157.214.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5250
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;108.157.214.109.		IN	A

;; AUTHORITY SECTION:
.			162	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031801 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 19 10:11:45 CST 2022
;; MSG SIZE  rcvd: 108
Host info
109.214.157.108.in-addr.arpa domain name pointer server-108-157-214-109.arn56.r.cloudfront.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
109.214.157.108.in-addr.arpa	name = server-108-157-214-109.arn56.r.cloudfront.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.252.51.182 attackspambots
Jun 24 06:52:05 ubuntu-2gb-nbg1-dc3-1 sshd[23079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.51.182
Jun 24 06:52:07 ubuntu-2gb-nbg1-dc3-1 sshd[23079]: Failed password for invalid user admin from 222.252.51.182 port 55827 ssh2
...
2019-06-24 16:16:02
49.248.17.195 attackspambots
SPF Fail sender not permitted to send mail for @acilv.com
2019-06-24 16:24:59
66.240.205.34 attack
24.06.2019 07:17:26 Connection to port 54984 blocked by firewall
2019-06-24 16:42:53
51.255.65.46 attackspam
Automatic report - Web App Attack
2019-06-24 16:13:35
122.154.120.230 attack
Unauthorised access (Jun 24) SRC=122.154.120.230 LEN=52 TTL=114 ID=14475 DF TCP DPT=445 WINDOW=8192 SYN
2019-06-24 16:31:02
36.77.194.227 attackspam
this account has been hacking my social medias including instagram, line and icloud.
2019-06-24 16:18:47
159.192.230.229 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-06-24 16:25:37
217.244.88.231 attackbotsspam
2019-06-24 06:20:51,265 [snip] proftpd[8452] [snip].white.fastwebserver.de (pD9F458E7.dip0.t-ipconnect.de[217.244.88.231]): USER log-458 (Login failed): No such user found
2019-06-24 06:21:08,064 [snip] proftpd[8504] [snip].white.fastwebserver.de (pD9F458E7.dip0.t-ipconnect.de[217.244.88.231]): USER log-458 (Login failed): No such user found
2019-06-24 06:52:09,406 [snip] proftpd[13109] [snip].white.fastwebserver.de (pD9F458E7.dip0.t-ipconnect.de[217.244.88.231]): USER log-458 (Login failed): No such user found[...]
2019-06-24 16:14:01
131.196.4.98 attack
Jun 24 07:33:19 our-server-hostname postfix/smtpd[21718]: connect from unknown[131.196.4.98]
Jun x@x
Jun 24 07:33:22 our-server-hostname postfix/smtpd[21718]: lost connection after RCPT from unknown[131.196.4.98]
Jun 24 07:33:22 our-server-hostname postfix/smtpd[21718]: disconnect from unknown[131.196.4.98]
Jun 24 07:34:32 our-server-hostname postfix/smtpd[26250]: connect from unknown[131.196.4.98]
Jun x@x
Jun x@x
Jun x@x
Jun 24 07:34:37 our-server-hostname postfix/smtpd[26250]: lost connection after RCPT from unknown[131.196.4.98]
Jun 24 07:34:37 our-server-hostname postfix/smtpd[26250]: disconnect from unknown[131.196.4.98]
Jun 24 07:35:02 our-server-hostname postfix/smtpd[26266]: connect from unknown[131.196.4.98]
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun 24 07:35:10 our-server-hostname postfix/smtpd[26266]: lost connection after RCPT from unknown[131.196.4.98]
Jun 24 07:35:10 our-server-hostname postfix/smtpd[26266]:........
-------------------------------
2019-06-24 16:27:07
176.32.230.29 attackspambots
xmlrpc attack
2019-06-24 16:49:40
218.92.0.200 attackspambots
Jun 24 06:50:25 dev sshd\[3032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.200  user=root
Jun 24 06:50:27 dev sshd\[3032\]: Failed password for root from 218.92.0.200 port 10805 ssh2
...
2019-06-24 16:44:20
164.132.193.27 attackspambots
Jun 24 06:49:34 klukluk sshd\[27846\]: Invalid user shutdown from 164.132.193.27
Jun 24 06:49:59 klukluk sshd\[28239\]: Invalid user halt from 164.132.193.27
Jun 24 06:50:21 klukluk sshd\[28833\]: Invalid user vcsa from 164.132.193.27
...
2019-06-24 16:48:22
115.231.220.188 attackbotsspam
¯\_(ツ)_/¯
2019-06-24 16:21:18
183.108.83.219 attackspambots
¯\_(ツ)_/¯
2019-06-24 16:02:39
107.77.253.8 attackspambots
Chat Spam
2019-06-24 16:49:15

Recently Reported IPs

108.156.120.22 108.157.214.120 108.157.214.18 108.157.214.46
108.157.214.63 108.157.214.79 108.157.214.98 108.159.227.119
108.159.227.28 108.160.145.114 108.160.145.78 108.160.146.0
108.160.151.144 108.160.158.207 108.160.227.184 108.161.129.40
103.122.166.178 108.163.250.26 108.167.132.104 108.167.132.125