Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.16.26.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33740
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;193.16.26.214.			IN	A

;; AUTHORITY SECTION:
.			532	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050700 1800 900 604800 86400

;; Query time: 175 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 07 21:42:01 CST 2020
;; MSG SIZE  rcvd: 117
Host info
214.26.16.193.in-addr.arpa has no PTR record
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.138, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.136
Address:	100.100.2.136#53

** server can't find 214.26.16.193.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
60.223.235.71 attack
Fail2Ban Ban Triggered
2020-09-05 15:51:43
51.83.139.55 attackspambots
Brute forcing email accounts
2020-09-05 15:56:46
222.186.175.163 attackbots
Sep  5 09:21:17 santamaria sshd\[31703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163  user=root
Sep  5 09:21:19 santamaria sshd\[31703\]: Failed password for root from 222.186.175.163 port 20230 ssh2
Sep  5 09:21:44 santamaria sshd\[31709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163  user=root
...
2020-09-05 15:30:28
49.233.26.75 attack
Invalid user nexus from 49.233.26.75 port 37156
2020-09-05 15:16:53
134.122.112.119 attackbotsspam
 TCP (SYN) 134.122.112.119:52273 -> port 8086, len 44
2020-09-05 15:38:28
34.89.89.84 attackspambots
Sep  5 07:36:43 ip-172-31-16-56 sshd\[15020\]: Failed password for root from 34.89.89.84 port 50868 ssh2\
Sep  5 07:40:30 ip-172-31-16-56 sshd\[15141\]: Invalid user cashier from 34.89.89.84\
Sep  5 07:40:32 ip-172-31-16-56 sshd\[15141\]: Failed password for invalid user cashier from 34.89.89.84 port 58912 ssh2\
Sep  5 07:44:22 ip-172-31-16-56 sshd\[15229\]: Invalid user maya from 34.89.89.84\
Sep  5 07:44:24 ip-172-31-16-56 sshd\[15229\]: Failed password for invalid user maya from 34.89.89.84 port 38718 ssh2\
2020-09-05 15:58:35
176.65.241.165 attackspambots
Honeypot attack, port: 445, PTR: mail.omanfuel.com.
2020-09-05 15:40:38
171.7.65.123 attack
Sep  4 05:48:34 kmh-wmh-003-nbg03 sshd[31272]: Invalid user user3 from 171.7.65.123 port 51274
Sep  4 05:48:34 kmh-wmh-003-nbg03 sshd[31272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.7.65.123
Sep  4 05:48:36 kmh-wmh-003-nbg03 sshd[31272]: Failed password for invalid user user3 from 171.7.65.123 port 51274 ssh2
Sep  4 05:48:37 kmh-wmh-003-nbg03 sshd[31272]: Received disconnect from 171.7.65.123 port 51274:11: Bye Bye [preauth]
Sep  4 05:48:37 kmh-wmh-003-nbg03 sshd[31272]: Disconnected from 171.7.65.123 port 51274 [preauth]
Sep  4 05:53:01 kmh-wmh-003-nbg03 sshd[31690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.7.65.123  user=r.r
Sep  4 05:53:03 kmh-wmh-003-nbg03 sshd[31690]: Failed password for r.r from 171.7.65.123 port 58506 ssh2
Sep  4 05:53:04 kmh-wmh-003-nbg03 sshd[31690]: Received disconnect from 171.7.65.123 port 58506:11: Bye Bye [preauth]
Sep  4 05:53:04 kmh-wmh........
-------------------------------
2020-09-05 15:12:19
93.118.119.114 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-05 15:36:33
125.99.206.133 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-05 15:55:37
106.12.18.168 attack
Automatic report - Banned IP Access
2020-09-05 15:51:23
182.190.198.174 attack
Sep  4 18:49:15 mellenthin postfix/smtpd[32584]: NOQUEUE: reject: RCPT from unknown[182.190.198.174]: 554 5.7.1 Service unavailable; Client host [182.190.198.174] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/182.190.198.174; from= to= proto=ESMTP helo=<[182.190.198.174]>
2020-09-05 15:47:56
49.234.182.99 attackspambots
Multiple SSH authentication failures from 49.234.182.99
2020-09-05 15:44:11
119.136.198.82 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-05 15:44:29
217.23.1.87 attackbots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-05T02:38:59Z and 2020-09-05T03:11:39Z
2020-09-05 15:58:55

Recently Reported IPs

101.109.179.31 163.172.82.44 47.15.181.61 49.204.184.134
179.52.63.235 114.35.223.59 110.78.174.4 1.58.200.134
113.23.4.247 87.117.51.56 71.114.102.209 35.173.249.72
212.95.129.50 72.27.84.93 41.234.192.8 89.169.19.19
89.232.63.222 189.41.154.232 46.109.176.29 27.246.107.162