Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Madison

Region: Wisconsin

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.158.107.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65215
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;159.158.107.14.			IN	A

;; AUTHORITY SECTION:
.			124	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110100 1800 900 604800 86400

;; Query time: 346 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 20:53:24 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 14.107.158.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.107.158.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
116.68.160.18 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 09:06:39
51.79.49.146 attackbotsspam
2323/tcp 23/tcp
[2019-06-21]2pkt
2019-06-22 09:15:42
185.15.196.169 attack
Probing for vulnerable PHP code /n2n7yabq.php
2019-06-22 08:45:01
146.120.14.48 attackspambots
Bad Request: "GET / HTTP/1.0"
2019-06-22 09:14:23
69.89.31.101 attackspambots
Probing for vulnerable PHP code /n2n7yabq.php
2019-06-22 09:02:39
79.144.240.58 attack
Request: "GET / HTTP/1.1"
2019-06-22 09:00:50
51.75.206.26 attackspam
SSH/22 MH Probe, BF, Hack -
2019-06-22 09:11:14
51.68.11.215 attackspam
Request: "GET /cache/cache.php HTTP/1.1" Request: "GET /cache/cache.php HTTP/1.1"
2019-06-22 09:23:13
211.103.131.74 attack
firewall-block, port(s): 22222/tcp
2019-06-22 09:18:51
202.62.41.165 attackspam
8080/tcp
[2019-06-07/21]2pkt
2019-06-22 09:13:43
111.161.65.41 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-22 09:17:40
185.156.177.20 attackspambots
Bad Request: "\x03\x00\x00/*\xE0\x00\x00\x00\x00\x00Cookie: mstshash=Administr" Bad Request: "\x03\x00\x00/*\xE0\x00\x00\x00\x00\x00Cookie: mstshash=Administr" Bad Request: "\x03\x00\x00/*\xE0\x00\x00\x00\x00\x00Cookie: mstshash=Administr" Bad Request: "\x03\x00\x00/*\xE0\x00\x00\x00\x00\x00Cookie: mstshash=Administr"
2019-06-22 09:09:53
189.46.112.194 attackbots
445/tcp
[2019-06-21]1pkt
2019-06-22 09:03:20
220.225.126.55 attackbotsspam
Triggered by Fail2Ban at Vostok web server
2019-06-22 08:39:32
185.156.177.11 attackspam
19/6/21@15:41:10: FAIL: Alarm-Intrusion address from=185.156.177.11
...
2019-06-22 08:32:55

Recently Reported IPs

110.8.253.24 247.36.113.177 105.69.194.150 222.16.49.78
211.36.157.237 200.112.20.138 87.106.123.111 122.154.198.100
5.187.2.99 203.12.147.233 163.84.167.31 196.6.0.83
44.148.250.181 199.185.184.128 135.200.58.162 109.225.0.65
173.124.175.200 122.180.71.247 114.178.13.196 172.237.246.238