Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.214.53.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45793
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;162.214.53.159.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 08:24:24 CST 2022
;; MSG SIZE  rcvd: 107
Host info
159.53.214.162.in-addr.arpa domain name pointer server.kompraqui.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.53.214.162.in-addr.arpa	name = server.kompraqui.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.33.63.224 attack
Sep 22 09:10:11 mail sshd\[28131\]: Invalid user user from 27.33.63.224
Sep 22 09:10:12 mail sshd\[28131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.33.63.224
Sep 22 09:10:14 mail sshd\[28131\]: Failed password for invalid user user from 27.33.63.224 port 33250 ssh2
...
2019-09-22 19:19:57
202.51.74.189 attackbotsspam
Sep 22 00:59:37 hpm sshd\[13597\]: Invalid user ftp from 202.51.74.189
Sep 22 00:59:37 hpm sshd\[13597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189
Sep 22 00:59:39 hpm sshd\[13597\]: Failed password for invalid user ftp from 202.51.74.189 port 54706 ssh2
Sep 22 01:04:42 hpm sshd\[14047\]: Invalid user teamspeak from 202.51.74.189
Sep 22 01:04:42 hpm sshd\[14047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189
2019-09-22 19:39:40
115.54.98.247 attackspambots
Unauthorised access (Sep 22) SRC=115.54.98.247 LEN=40 TTL=49 ID=48659 TCP DPT=8080 WINDOW=45641 SYN
2019-09-22 19:36:15
200.95.175.48 attackspam
Sep 22 13:42:35 tuotantolaitos sshd[18298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.95.175.48
Sep 22 13:42:37 tuotantolaitos sshd[18298]: Failed password for invalid user qazwsx123 from 200.95.175.48 port 45552 ssh2
...
2019-09-22 18:56:38
182.232.186.134 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-22 02:51:55,286 INFO [shellcode_manager] (182.232.186.134) no match, writing hexdump (deb9539b6d8eb55eb4a81b7bd85d4d32 :1937092) - MS17010 (EternalBlue)
2019-09-22 19:03:22
83.97.20.212 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-22 18:36:39
185.150.88.18 attackspam
Sep 22 08:20:07 [snip] sshd[26658]: Invalid user ubnt from 185.150.88.18 port 54118
Sep 22 08:20:07 [snip] sshd[26658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.150.88.18
Sep 22 08:20:09 [snip] sshd[26658]: Failed password for invalid user ubnt from 185.150.88.18 port 54118 ssh2[...]
2019-09-22 18:22:35
116.255.149.226 attackbotsspam
Sep 22 07:40:18 Tower sshd[24678]: Connection from 116.255.149.226 port 46002 on 192.168.10.220 port 22
Sep 22 07:40:20 Tower sshd[24678]: Invalid user aab from 116.255.149.226 port 46002
Sep 22 07:40:20 Tower sshd[24678]: error: Could not get shadow information for NOUSER
Sep 22 07:40:20 Tower sshd[24678]: Failed password for invalid user aab from 116.255.149.226 port 46002 ssh2
Sep 22 07:40:20 Tower sshd[24678]: Received disconnect from 116.255.149.226 port 46002:11: Bye Bye [preauth]
Sep 22 07:40:20 Tower sshd[24678]: Disconnected from invalid user aab 116.255.149.226 port 46002 [preauth]
2019-09-22 19:44:23
150.95.24.185 attackbotsspam
$f2bV_matches
2019-09-22 19:36:42
128.199.154.60 attackbots
2019-09-22T10:26:19.092199abusebot-3.cloudsearch.cf sshd\[5712\]: Invalid user ph from 128.199.154.60 port 57228
2019-09-22 18:58:26
119.4.225.108 attack
$f2bV_matches
2019-09-22 18:49:32
79.137.84.144 attackbotsspam
Sep 22 12:16:41 plex sshd[5032]: Invalid user barbie from 79.137.84.144 port 42570
2019-09-22 18:32:14
182.73.66.66 attackspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(09221023)
2019-09-22 19:08:44
125.167.75.163 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-22 02:14:19,615 INFO [shellcode_manager] (125.167.75.163) no match, writing hexdump (62e3d21b43bdda50d60db8ce7c48f043 :1824802) - MS17010 (EternalBlue)
2019-09-22 18:54:23
173.239.37.139 attackbotsspam
2019-09-22T04:19:16.232667abusebot-7.cloudsearch.cf sshd\[20621\]: Invalid user speed from 173.239.37.139 port 48816
2019-09-22 19:19:02

Recently Reported IPs

185.177.104.165 84.53.229.160 45.190.158.170 103.175.80.3
177.220.220.150 171.227.198.242 180.136.229.244 91.247.39.210
170.106.51.47 179.110.98.245 60.215.191.217 103.253.0.73
162.62.224.188 187.188.17.134 94.153.212.68 58.11.36.248
168.70.29.34 109.94.101.210 117.215.207.222 176.235.131.231