Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Athens

Region: Attica

Country: Greece

Internet Service Provider: unknown

Hostname: unknown

Organization: Forthnet

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.219.156.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 385
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.219.156.14.			IN	A

;; AUTHORITY SECTION:
.			2450	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051400 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue May 14 21:03:42 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 14.156.219.194.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 14.156.219.194.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
95.110.154.101 attackspam
Invalid user xr from 95.110.154.101 port 38774
2020-04-01 14:00:10
198.144.149.253 attackbotsspam
Icarus honeypot on github
2020-04-01 14:13:56
62.97.44.33 attack
2020-04-01T05:54:16.309089  sshd[30232]: Invalid user admin from 62.97.44.33 port 52150
2020-04-01T05:54:16.337930  sshd[30232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.97.44.33
2020-04-01T05:54:16.309089  sshd[30232]: Invalid user admin from 62.97.44.33 port 52150
2020-04-01T05:54:18.208943  sshd[30232]: Failed password for invalid user admin from 62.97.44.33 port 52150 ssh2
...
2020-04-01 14:05:14
121.148.0.153 attackspambots
Telnetd brute force attack detected by fail2ban
2020-04-01 14:07:53
80.211.71.17 attackspam
(sshd) Failed SSH login from 80.211.71.17 (IT/Italy/host17-71-211-80.serverdedicati.aruba.it): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  1 06:32:39 ubnt-55d23 sshd[15085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.71.17  user=root
Apr  1 06:32:41 ubnt-55d23 sshd[15085]: Failed password for root from 80.211.71.17 port 46108 ssh2
2020-04-01 14:00:45
200.150.126.142 attack
Invalid user kfu from 200.150.126.142 port 57974
2020-04-01 14:17:00
177.129.203.118 attack
Invalid user it from 177.129.203.118 port 48524
2020-04-01 14:04:07
18.236.227.66 attackbots
Bad bot/spoofed identity
2020-04-01 14:40:06
106.13.68.190 attackspambots
Invalid user web1 from 106.13.68.190 port 41840
2020-04-01 14:25:49
118.89.60.105 attack
2020-04-01T03:45:11.181845Z 54eae3b0f107 New connection: 118.89.60.105:24640 (172.17.0.3:2222) [session: 54eae3b0f107]
2020-04-01T03:54:16.292339Z c002083cbdab New connection: 118.89.60.105:48457 (172.17.0.3:2222) [session: c002083cbdab]
2020-04-01 14:06:17
180.241.45.167 attackbotsspam
20/3/31@23:54:10: FAIL: Alarm-Network address from=180.241.45.167
...
2020-04-01 14:09:40
187.141.71.27 attack
Apr  1 08:11:24 vmd48417 sshd[26490]: Failed password for root from 187.141.71.27 port 45350 ssh2
2020-04-01 14:29:50
156.0.229.194 attack
Absender hat Spam-Falle ausgel?st
2020-04-01 14:26:36
165.227.93.39 attackspam
Invalid user mep from 165.227.93.39 port 42092
2020-04-01 14:40:38
222.252.30.117 attack
ssh brute force
2020-04-01 14:39:19

Recently Reported IPs

214.11.154.160 208.88.197.91 201.88.200.226 195.245.59.161
65.86.135.103 184.69.69.147 202.91.198.117 94.102.130.198
116.149.166.14 171.38.219.55 173.2.115.32 94.140.200.129
190.2.81.206 17.64.62.243 82.209.21.133 66.112.65.193
64.37.172.47 3.85.101.253 27.151.115.81 77.39.10.16