Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.214.195.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53871
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;168.214.195.137.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 06:31:09 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 137.195.214.168.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 137.195.214.168.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.36.156.70 attackspam
Unauthorised access (Nov 25) SRC=157.36.156.70 LEN=52 TOS=0x08 PREC=0x20 TTL=111 ID=25230 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-26 03:44:11
85.214.237.80 attackbots
port scan and connect, tcp 22 (ssh)
2019-11-26 04:04:40
116.48.142.127 attackspam
Automatic report - Banned IP Access
2019-11-26 04:24:26
186.95.60.61 attackbotsspam
Unauthorised access (Nov 25) SRC=186.95.60.61 LEN=52 TTL=115 ID=28767 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 25) SRC=186.95.60.61 LEN=52 TTL=115 ID=8926 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-26 03:55:31
164.132.195.231 attackspambots
fail2ban honeypot
2019-11-26 04:26:01
213.102.82.225 attackbotsspam
Unauthorised access (Nov 25) SRC=213.102.82.225 LEN=40 TTL=56 ID=38130 TCP DPT=8080 WINDOW=26291 SYN
2019-11-26 04:09:39
106.13.12.210 attackspambots
$f2bV_matches
2019-11-26 04:19:39
198.50.197.221 attack
Nov 25 18:49:33 *** sshd[16698]: Failed password for invalid user sprengel from 198.50.197.221 port 17266 ssh2
Nov 25 19:26:58 *** sshd[17239]: Failed password for invalid user ident from 198.50.197.221 port 23048 ssh2
Nov 25 19:33:08 *** sshd[17269]: Failed password for invalid user neil from 198.50.197.221 port 59702 ssh2
Nov 25 20:17:19 *** sshd[17863]: Failed password for invalid user ssh from 198.50.197.221 port 34036 ssh2
Nov 25 20:23:35 *** sshd[17968]: Failed password for invalid user dinnin from 198.50.197.221 port 14164 ssh2
Nov 25 20:42:28 *** sshd[18254]: Failed password for invalid user 789 from 198.50.197.221 port 11270 ssh2
Nov 25 20:48:46 *** sshd[18362]: Failed password for invalid user tuite from 198.50.197.221 port 47978 ssh2
Nov 25 20:55:02 *** sshd[18428]: Failed password for invalid user malecki from 198.50.197.221 port 28166 ssh2
Nov 25 21:01:10 *** sshd[18503]: Failed password for invalid user 2222222 from 198.50.197.221 port 64800 ssh2
Nov 25 21:07:29 *** sshd[18628]: Failed password
2019-11-26 04:07:24
160.238.239.163 attack
" "
2019-11-26 04:02:27
138.68.4.198 attackspambots
Nov 25 13:48:10 firewall sshd[12096]: Failed password for invalid user shuhei from 138.68.4.198 port 40974 ssh2
Nov 25 13:54:28 firewall sshd[12208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.198  user=bin
Nov 25 13:54:30 firewall sshd[12208]: Failed password for bin from 138.68.4.198 port 48310 ssh2
...
2019-11-26 03:52:45
192.99.166.243 attackbots
Nov 25 15:08:19 TORMINT sshd\[16762\]: Invalid user ftp from 192.99.166.243
Nov 25 15:08:19 TORMINT sshd\[16762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.166.243
Nov 25 15:08:21 TORMINT sshd\[16762\]: Failed password for invalid user ftp from 192.99.166.243 port 58792 ssh2
...
2019-11-26 04:25:02
49.88.112.113 attack
Nov 25 09:36:57 web9 sshd\[8221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Nov 25 09:36:59 web9 sshd\[8221\]: Failed password for root from 49.88.112.113 port 29231 ssh2
Nov 25 09:37:58 web9 sshd\[8362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Nov 25 09:38:00 web9 sshd\[8362\]: Failed password for root from 49.88.112.113 port 27831 ssh2
Nov 25 09:39:01 web9 sshd\[8509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
2019-11-26 03:47:06
112.66.90.108 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-26 04:08:31
40.118.46.159 attackbotsspam
2019-11-25T17:55:41.579012abusebot-4.cloudsearch.cf sshd\[19039\]: Invalid user vision from 40.118.46.159 port 34832
2019-11-26 03:46:39
62.48.150.175 attackspam
Nov 25 20:11:55 ArkNodeAT sshd\[1325\]: Invalid user Urmas from 62.48.150.175
Nov 25 20:11:55 ArkNodeAT sshd\[1325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.48.150.175
Nov 25 20:11:57 ArkNodeAT sshd\[1325\]: Failed password for invalid user Urmas from 62.48.150.175 port 44112 ssh2
2019-11-26 03:46:22

Recently Reported IPs

240.198.58.37 57.149.83.36 89.176.243.104 15.202.203.248
86.13.19.254 185.73.230.87 118.148.183.188 40.144.161.206
120.46.166.231 169.52.15.166 69.237.244.192 233.161.246.15
250.96.141.249 119.32.86.24 18.60.48.65 193.32.188.113
2.92.200.92 227.24.207.71 214.100.84.5 9.133.21.149