Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.149.212.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3000
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;193.149.212.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 22:47:45 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 14.212.149.193.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.212.149.193.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
152.32.102.92 attack
UTC: 2019-11-30 port: 26/tcp
2019-12-01 19:00:22
162.252.57.36 attackbots
Dec  1 11:13:02 venus sshd\[25547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.252.57.36  user=root
Dec  1 11:13:04 venus sshd\[25547\]: Failed password for root from 162.252.57.36 port 52040 ssh2
Dec  1 11:16:09 venus sshd\[25596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.252.57.36  user=root
...
2019-12-01 19:27:00
114.40.161.62 attackspam
UTC: 2019-11-30 port: 23/tcp
2019-12-01 18:47:34
112.215.175.246 attackspambots
Dec  1 07:24:44 herz-der-gamer sshd[2701]: Invalid user media from 112.215.175.246 port 54245
Dec  1 07:24:44 herz-der-gamer sshd[2701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.215.175.246
Dec  1 07:24:44 herz-der-gamer sshd[2701]: Invalid user media from 112.215.175.246 port 54245
Dec  1 07:24:46 herz-der-gamer sshd[2701]: Failed password for invalid user media from 112.215.175.246 port 54245 ssh2
...
2019-12-01 19:19:26
89.100.106.42 attackbotsspam
Dec  1 09:17:15 server sshd\[22166\]: Invalid user tigger from 89.100.106.42
Dec  1 09:17:15 server sshd\[22166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.106.42 
Dec  1 09:17:17 server sshd\[22166\]: Failed password for invalid user tigger from 89.100.106.42 port 34054 ssh2
Dec  1 09:38:46 server sshd\[27554\]: Invalid user admin from 89.100.106.42
Dec  1 09:38:46 server sshd\[27554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.106.42 
...
2019-12-01 19:16:41
207.154.243.255 attackspam
Dec  1 07:25:00 serwer sshd\[29394\]: Invalid user limon from 207.154.243.255 port 37454
Dec  1 07:25:00 serwer sshd\[29394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.243.255
Dec  1 07:25:02 serwer sshd\[29394\]: Failed password for invalid user limon from 207.154.243.255 port 37454 ssh2
...
2019-12-01 19:00:41
205.185.127.43 attack
Portscan or hack attempt detected by psad/fwsnort
2019-12-01 19:12:30
106.75.91.43 attackbots
Dec  1 00:49:12 hpm sshd\[529\]: Invalid user muie from 106.75.91.43
Dec  1 00:49:12 hpm sshd\[529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.91.43
Dec  1 00:49:14 hpm sshd\[529\]: Failed password for invalid user muie from 106.75.91.43 port 37218 ssh2
Dec  1 00:53:41 hpm sshd\[907\]: Invalid user heping from 106.75.91.43
Dec  1 00:53:41 hpm sshd\[907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.91.43
2019-12-01 18:57:50
180.251.191.126 attackspam
Dec  1 07:00:22 XXX sshd[35619]: Invalid user pi from 180.251.191.126 port 41273
2019-12-01 19:10:44
98.156.148.239 attack
2019-12-01T05:16:34.6897691495-001 sshd\[56034\]: Invalid user azara from 98.156.148.239 port 47926
2019-12-01T05:16:34.6930391495-001 sshd\[56034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.156.148.239
2019-12-01T05:16:36.2972661495-001 sshd\[56034\]: Failed password for invalid user azara from 98.156.148.239 port 47926 ssh2
2019-12-01T05:19:51.6115821495-001 sshd\[56217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.156.148.239  user=root
2019-12-01T05:19:53.9275051495-001 sshd\[56217\]: Failed password for root from 98.156.148.239 port 55102 ssh2
2019-12-01T05:23:06.0170571495-001 sshd\[56310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.156.148.239  user=root
...
2019-12-01 18:47:53
89.45.17.11 attackspam
Dec  1 11:45:56 MK-Soft-VM8 sshd[998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.45.17.11 
Dec  1 11:45:58 MK-Soft-VM8 sshd[998]: Failed password for invalid user webmaster from 89.45.17.11 port 43032 ssh2
...
2019-12-01 19:18:36
164.52.24.162 attackspambots
" "
2019-12-01 18:59:25
177.155.36.80 attack
400 BAD REQUEST
2019-12-01 19:01:06
180.166.114.14 attack
fail2ban
2019-12-01 19:22:17
223.71.167.61 attack
01.12.2019 10:29:45 POP3s access blocked by firewall
2019-12-01 19:17:25

Recently Reported IPs

170.232.226.24 98.241.171.165 114.157.172.141 114.162.213.160
47.178.107.116 101.92.148.233 52.92.113.79 16.161.70.157
249.163.200.122 252.181.73.73 141.144.92.76 60.26.101.19
132.54.105.22 214.117.196.147 110.4.191.127 117.22.165.213
133.114.22.25 156.76.31.44 29.121.246.221 93.176.183.82