Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dallas

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.123.83.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26360
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.123.83.214.			IN	A

;; AUTHORITY SECTION:
.			460	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040200 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 14:42:18 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 214.83.123.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.83.123.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
101.36.150.231 attackspam
Lines containing failures of 101.36.150.231
Oct 15 18:56:21 nextcloud sshd[6956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.150.231  user=r.r
Oct 15 18:56:23 nextcloud sshd[6956]: Failed password for r.r from 101.36.150.231 port 45980 ssh2
Oct 15 18:56:24 nextcloud sshd[6956]: Received disconnect from 101.36.150.231 port 45980:11: Bye Bye [preauth]
Oct 15 18:56:24 nextcloud sshd[6956]: Disconnected from authenticating user r.r 101.36.150.231 port 45980 [preauth]
Oct 15 19:14:34 nextcloud sshd[9838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.150.231  user=games
Oct 15 19:14:36 nextcloud sshd[9838]: Failed password for games from 101.36.150.231 port 32958 ssh2
Oct 15 19:14:36 nextcloud sshd[9838]: Received disconnect from 101.36.150.231 port 32958:11: Bye Bye [preauth]
Oct 15 19:14:36 nextcloud sshd[9838]: Disconnected from authenticating user games 101.36.150.231 port........
------------------------------
2019-10-16 07:08:07
39.64.193.37 attack
Oct 15 19:54:44 localhost sshd\[130210\]: Invalid user pi from 39.64.193.37 port 51920
Oct 15 19:54:44 localhost sshd\[130211\]: Invalid user pi from 39.64.193.37 port 51918
Oct 15 19:54:44 localhost sshd\[130210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.64.193.37
Oct 15 19:54:44 localhost sshd\[130211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.64.193.37
Oct 15 19:54:46 localhost sshd\[130210\]: Failed password for invalid user pi from 39.64.193.37 port 51920 ssh2
...
2019-10-16 07:03:29
167.99.255.246 attack
leo_www
2019-10-16 07:06:45
104.245.145.53 attack
(From everett.hai@gmail.com) Your opinion is needed. Respond to a few questions in our survey and receive a free $1000 gas card valid at Mobil Gas Stations. Click here: http://freegascard.giveawaysusa.xyz
2019-10-16 07:00:45
151.75.250.138 attackbots
Automatic report - Port Scan Attack
2019-10-16 06:44:36
61.74.109.55 attackbots
12222/tcp 22222/tcp 2222/tcp...
[2019-10-15]20pkt,5pt.(tcp)
2019-10-16 06:58:16
111.12.52.239 attackspambots
Oct 15 14:46:13 dallas01 sshd[7808]: Failed password for root from 111.12.52.239 port 34610 ssh2
Oct 15 14:50:52 dallas01 sshd[8508]: Failed password for root from 111.12.52.239 port 37466 ssh2
2019-10-16 06:56:12
45.80.64.127 attackbotsspam
fraudulent SSH attempt
2019-10-16 06:49:18
187.163.172.67 attackbots
Automatic report - Port Scan Attack
2019-10-16 07:12:40
111.67.200.159 attackbotsspam
Oct 15 21:14:23 XXX sshd[10665]: Invalid user miner from 111.67.200.159 port 36819
2019-10-16 06:38:55
35.188.77.30 attack
Automatic report - Banned IP Access
2019-10-16 06:57:14
181.16.127.78 attack
Oct 15 21:54:42 xeon sshd[60064]: Failed password for invalid user qm from 181.16.127.78 port 39710 ssh2
2019-10-16 06:38:00
121.254.26.153 attack
Oct 15 12:23:40 php1 sshd\[27615\]: Invalid user TicTac2017 from 121.254.26.153
Oct 15 12:23:40 php1 sshd\[27615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.254.26.153
Oct 15 12:23:42 php1 sshd\[27615\]: Failed password for invalid user TicTac2017 from 121.254.26.153 port 51922 ssh2
Oct 15 12:28:07 php1 sshd\[28329\]: Invalid user lovely from 121.254.26.153
Oct 15 12:28:07 php1 sshd\[28329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.254.26.153
2019-10-16 06:38:35
120.52.152.18 attackbotsspam
15.10.2019 22:44:32 Connection to port 2152 blocked by firewall
2019-10-16 06:47:35
43.252.149.35 attackspam
Automatic report - Banned IP Access
2019-10-16 06:37:30

Recently Reported IPs

80.40.167.60 122.125.198.45 39.107.45.253 102.123.100.95
207.106.91.248 126.91.229.125 190.159.52.169 52.64.194.9
196.179.227.158 190.48.204.5 27.171.217.184 138.62.15.60
38.252.43.163 188.119.16.55 152.73.91.1 148.61.142.255
200.124.27.86 43.32.80.98 61.189.72.18 109.167.4.67