Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.122.152.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48363
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;193.122.152.214.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 05:42:54 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 214.152.122.193.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.152.122.193.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
109.165.74.183 attackbots
445/tcp 445/tcp 445/tcp
[2019-06-21]3pkt
2019-06-21 23:26:29
196.52.43.59 attackspam
Portscanning on different or same port(s).
2019-06-22 00:08:23
91.132.6.235 attack
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-21 11:09:06]
2019-06-22 00:11:42
117.196.15.194 attackbots
port scan and connect, tcp 23 (telnet)
2019-06-21 23:00:36
77.42.111.166 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-21 23:41:49
14.253.47.65 attack
445/tcp
[2019-06-21]1pkt
2019-06-22 00:13:30
117.6.133.235 attackbotsspam
Unauthorised access (Jun 21) SRC=117.6.133.235 LEN=52 TTL=108 ID=20184 DF TCP DPT=445 WINDOW=8192 SYN
2019-06-21 23:49:14
69.94.143.10 attack
TCP src-port=42619   dst-port=25    zen-spamhaus spam-sorbs unsubscore         (320)
2019-06-21 23:19:17
5.22.192.210 attackbotsspam
23/tcp
[2019-06-21]1pkt
2019-06-21 23:47:09
154.68.5.169 attackbots
22/tcp
[2019-06-21]1pkt
2019-06-21 23:03:13
58.22.194.44 attackbotsspam
Brute force attempt
2019-06-21 23:22:59
111.227.160.125 attackspambots
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x
2019-06-18 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=111.227.160.125
2019-06-22 00:18:37
162.243.150.26 attack
7000/tcp 15432/tcp 41592/tcp...
[2019-04-21/06-21]79pkt,53pt.(tcp),6pt.(udp),2proto
2019-06-21 23:54:53
54.37.154.254 attackbotsspam
Jun 21 10:27:48 localhost sshd\[12280\]: Invalid user wa from 54.37.154.254 port 42998
Jun 21 10:27:48 localhost sshd\[12280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.154.254
...
2019-06-21 23:19:37
124.78.252.242 attack
¯\_(ツ)_/¯
2019-06-21 23:27:33

Recently Reported IPs

34.41.174.103 21.36.133.140 86.224.251.174 231.229.64.234
75.103.210.135 166.0.121.75 33.52.149.91 212.114.26.141
169.224.22.143 248.238.130.233 243.210.46.123 174.73.114.208
37.18.66.223 207.81.175.219 83.24.15.86 132.198.108.229
9.137.169.134 223.91.39.71 228.56.219.230 108.151.209.82