Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santiago de los Caballeros

Region: Provincia de Santiago

Country: Dominican Republic

Internet Service Provider: unknown

Hostname: unknown

Organization: Compañía Dominicana de Teléfonos, C. por A. - CODETEL

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 179.53.148.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54642
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;179.53.148.214.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 13:27:16 CST 2019
;; MSG SIZE  rcvd: 118

Host info
214.148.53.179.in-addr.arpa domain name pointer 214.148.53.179.d.dyn.claro.net.do.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
214.148.53.179.in-addr.arpa	name = 214.148.53.179.d.dyn.claro.net.do.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
163.172.9.85 attackbotsspam
 UDP 163.172.9.85:5651 -> port 5060, len 430
2020-06-23 06:47:20
118.202.255.141 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2020-06-23 06:29:53
207.32.218.42 attackbotsspam
Brute forcing email accounts
2020-06-23 07:07:15
87.251.74.44 attack
Multiport scan : 65 ports scanned 11 60 65 80 92 100 115 132 145 152 184 291 311 312 322 335 430 474 476 490 501 506 516 524 541 561 570 586 607 706 743 745 760 839 894 906 983 987 1005 1025 1027 1049 1052 1060 1069 1083 1103 1114 1142 1167 1214 1222 1356 1396 1438 1448 1454 1461 1468 1478 1481 1482 1488 1494 1498
2020-06-23 06:46:24
187.163.39.133 attackspam
20/6/22@16:35:48: FAIL: Alarm-Network address from=187.163.39.133
20/6/22@16:35:48: FAIL: Alarm-Network address from=187.163.39.133
...
2020-06-23 06:33:10
186.215.235.9 attackbotsspam
Jun 23 06:35:17 localhost sshd[1899267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.215.235.9  user=root
Jun 23 06:35:20 localhost sshd[1899267]: Failed password for root from 186.215.235.9 port 47265 ssh2
...
2020-06-23 07:07:47
76.186.123.165 attackspam
SSH Invalid Login
2020-06-23 06:52:57
112.85.42.173 attack
Jun 23 00:32:22 home sshd[29590]: Failed password for root from 112.85.42.173 port 7958 ssh2
Jun 23 00:32:35 home sshd[29590]: error: maximum authentication attempts exceeded for root from 112.85.42.173 port 7958 ssh2 [preauth]
Jun 23 00:32:41 home sshd[29632]: Failed password for root from 112.85.42.173 port 36556 ssh2
...
2020-06-23 06:37:43
180.70.138.57 attackbots
54068/udp 54068/udp 54068/udp...
[2020-06-22]6pkt,1pt.(udp)
2020-06-23 07:06:33
191.23.15.48 attackbots
23/tcp
[2020-06-22]1pkt
2020-06-23 07:03:14
46.38.145.253 attackspam
Jun 22 23:47:03 blackbee postfix/smtpd\[1020\]: warning: unknown\[46.38.145.253\]: SASL LOGIN authentication failed: authentication failure
Jun 22 23:47:54 blackbee postfix/smtpd\[1020\]: warning: unknown\[46.38.145.253\]: SASL LOGIN authentication failed: authentication failure
Jun 22 23:48:41 blackbee postfix/smtpd\[1020\]: warning: unknown\[46.38.145.253\]: SASL LOGIN authentication failed: authentication failure
Jun 22 23:49:25 blackbee postfix/smtpd\[1058\]: warning: unknown\[46.38.145.253\]: SASL LOGIN authentication failed: authentication failure
Jun 22 23:50:10 blackbee postfix/smtpd\[1058\]: warning: unknown\[46.38.145.253\]: SASL LOGIN authentication failed: authentication failure
...
2020-06-23 06:59:48
157.48.165.37 attack
Port probing on unauthorized port 445
2020-06-23 07:03:59
102.166.1.152 attackbots
445/tcp 445/tcp
[2020-06-22]2pkt
2020-06-23 07:04:21
37.187.7.95 attack
2020-06-22T20:30:03.141171shield sshd\[29292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ks3372588.kimsufi.com  user=root
2020-06-22T20:30:05.223011shield sshd\[29292\]: Failed password for root from 37.187.7.95 port 43883 ssh2
2020-06-22T20:35:25.701024shield sshd\[30163\]: Invalid user wuwu from 37.187.7.95 port 44542
2020-06-22T20:35:25.703740shield sshd\[30163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ks3372588.kimsufi.com
2020-06-22T20:35:26.986950shield sshd\[30163\]: Failed password for invalid user wuwu from 37.187.7.95 port 44542 ssh2
2020-06-23 07:00:43
198.46.135.250 attackbotsspam
[2020-06-22 18:51:06] NOTICE[1273][C-00003d14] chan_sip.c: Call from '' (198.46.135.250:60474) to extension '0002146462607540' rejected because extension not found in context 'public'.
[2020-06-22 18:51:06] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-22T18:51:06.384-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0002146462607540",SessionID="0x7f31c02adcc8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/198.46.135.250/60474",ACLName="no_extension_match"
[2020-06-22 18:52:05] NOTICE[1273][C-00003d16] chan_sip.c: Call from '' (198.46.135.250:59763) to extension '00146462607540' rejected because extension not found in context 'public'.
[2020-06-22 18:52:05] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-22T18:52:05.534-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00146462607540",SessionID="0x7f31c02adcc8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/U
...
2020-06-23 07:10:01

Recently Reported IPs

182.119.36.239 116.71.72.11 103.233.76.254 60.1.182.204
37.235.23.36 180.124.82.209 68.231.127.5 81.61.59.180
202.18.28.21 139.183.95.238 60.24.14.177 180.116.179.19
3.227.81.178 49.81.172.55 220.208.98.201 122.59.6.88
169.2.77.74 39.89.159.230 80.132.229.89 123.234.200.215