Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: London

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '195.140.214.16 - 195.140.214.31'

% Abuse contact for '195.140.214.16 - 195.140.214.31' is 'abuse@infrawat.ch'

inetnum:        195.140.214.16 - 195.140.214.31
netname:        INFRAWATCH
remarks:        -----------------------------------------------------
remarks:        Real time internet intelligence data
remarks:        infrawat.ch
remarks:        -----------------------------------------------------
country:        GB
geoloc:         51.494840911758295 -0.018682268947961784
org:            ORG-IL948-RIPE
admin-c:        LD7399-RIPE
tech-c:         LD7399-RIPE
status:         ASSIGNED PA
created:        2026-03-26T04:41:57Z
last-modified:  2026-03-27T02:01:08Z
source:         RIPE
mnt-by:         HYDRA-MNT

organisation:   ORG-IL948-RIPE
org-name:       Infrawatch Limited
org-type:       OTHER
address:        128 City Road
address:        London
address:        EC1V 2NX
country:        GB
abuse-c:        ACRO64026-RIPE
mnt-ref:        HYDRA-MNT
created:        2026-03-26T04:32:13Z
last-modified:  2026-03-26T04:32:13Z
source:         RIPE # Filtered
mnt-by:         HYDRA-MNT

person:         Lloyd Davies
address:        128 City Road
address:        London
address:        EC1V 2NX
address:        United Kingdom
phone:          +448000803330
nic-hdl:        LD7399-RIPE
created:        2026-03-26T04:34:31Z
last-modified:  2026-03-26T04:34:31Z
source:         RIPE # Filtered
mnt-by:         HYDRA-MNT

% Information related to '195.140.212.0/22AS25369'

route:          195.140.212.0/22
origin:         AS25369
mnt-by:         HYDRA-MNT
created:        2018-06-28T01:47:08Z
last-modified:  2018-06-28T01:47:08Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.140.214.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26808
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.140.214.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040201 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 07:00:33 CST 2026
;; MSG SIZE  rcvd: 107
Host info
21.214.140.195.in-addr.arpa domain name pointer 21.214.140.195.infrawat.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.214.140.195.in-addr.arpa	name = 21.214.140.195.infrawat.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.47.187.86 attackbotsspam
Aug  7 06:13:15 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 41.47.187.86 port 49353 ssh2 (target: 158.69.100.132:22, password: admin)
Aug  7 06:13:15 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 41.47.187.86 port 49353 ssh2 (target: 158.69.100.132:22, password: 1234)
Aug  7 06:13:16 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 41.47.187.86 port 49353 ssh2 (target: 158.69.100.132:22, password: raspberrypi)
Aug  7 06:13:16 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 41.47.187.86 port 49353 ssh2 (target: 158.69.100.132:22, password: 12345)
Aug  7 06:13:16 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 41.47.187.86 port 49353 ssh2 (target: 158.69.100.132:22, password: anko)
Aug  7 06:13:16 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 41.47.187.86 port 49353 ssh2 (target: 158.69.100.132:22, password: 12345)
Aug  7 06:13:16 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 41.47........
------------------------------
2019-08-07 23:21:31
14.247.253.102 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-07 05:24:16,547 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.247.253.102)
2019-08-07 23:42:42
35.202.17.165 attackbotsspam
2019-08-07T09:43:49.201446abusebot-3.cloudsearch.cf sshd\[16534\]: Invalid user erp from 35.202.17.165 port 45228
2019-08-07 23:04:08
165.22.61.82 attackspam
2019-08-07T15:57:58.359335  sshd[14802]: Invalid user ngit from 165.22.61.82 port 48000
2019-08-07T15:57:58.372998  sshd[14802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.61.82
2019-08-07T15:57:58.359335  sshd[14802]: Invalid user ngit from 165.22.61.82 port 48000
2019-08-07T15:58:00.339903  sshd[14802]: Failed password for invalid user ngit from 165.22.61.82 port 48000 ssh2
2019-08-07T16:03:25.954248  sshd[14878]: Invalid user raphael from 165.22.61.82 port 44672
...
2019-08-07 23:07:54
136.243.70.68 attack
20 attempts against mh-misbehave-ban on hill.magehost.pro
2019-08-07 22:43:00
77.39.9.14 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-07 13:53:22,843 INFO [amun_request_handler] PortScan Detected on Port: 445 (77.39.9.14)
2019-08-07 23:35:02
51.83.73.160 attackbotsspam
Aug  7 06:49:19 plusreed sshd[2133]: Invalid user amit from 51.83.73.160
...
2019-08-07 22:57:49
125.160.49.227 attackspam
Honeypot hit.
2019-08-07 23:19:35
86.98.71.39 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-07 05:39:29,299 INFO [amun_request_handler] PortScan Detected on Port: 445 (86.98.71.39)
2019-08-07 22:44:29
81.220.81.65 attack
2019-08-07T13:34:40.079792abusebot-3.cloudsearch.cf sshd\[17019\]: Invalid user tabatha from 81.220.81.65 port 47586
2019-08-07 22:48:20
182.90.118.130 attackbotsspam
Aug  7 06:01:08 plesk sshd[26847]: Invalid user javier from 182.90.118.130
Aug  7 06:01:08 plesk sshd[26847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.90.118.130 
Aug  7 06:01:10 plesk sshd[26847]: Failed password for invalid user javier from 182.90.118.130 port 14131 ssh2
Aug  7 06:01:10 plesk sshd[26847]: Received disconnect from 182.90.118.130: 11: Bye Bye [preauth]
Aug  7 06:19:22 plesk sshd[27195]: Invalid user nexus from 182.90.118.130
Aug  7 06:19:22 plesk sshd[27195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.90.118.130 
Aug  7 06:19:24 plesk sshd[27195]: Failed password for invalid user nexus from 182.90.118.130 port 45670 ssh2
Aug  7 06:19:24 plesk sshd[27195]: Received disconnect from 182.90.118.130: 11: Bye Bye [preauth]
Aug  7 06:22:50 plesk sshd[27315]: Invalid user image from 182.90.118.130
Aug  7 06:22:50 plesk sshd[27315]: pam_unix(sshd:auth): authentica........
-------------------------------
2019-08-07 22:57:13
185.211.245.198 attackspam
Aug  7 15:53:12 relay postfix/smtpd\[8053\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  7 15:53:28 relay postfix/smtpd\[12458\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  7 15:55:45 relay postfix/smtpd\[25323\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  7 15:55:58 relay postfix/smtpd\[13888\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  7 15:57:28 relay postfix/smtpd\[13888\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-07 22:52:37
43.224.212.59 attackspambots
Aug  7 08:54:12 mail sshd[21107]: Invalid user alison from 43.224.212.59
Aug  7 08:54:12 mail sshd[21107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.224.212.59
Aug  7 08:54:12 mail sshd[21107]: Invalid user alison from 43.224.212.59
Aug  7 08:54:14 mail sshd[21107]: Failed password for invalid user alison from 43.224.212.59 port 50810 ssh2
Aug  7 09:04:37 mail sshd[22485]: Invalid user pf from 43.224.212.59
...
2019-08-07 23:24:01
204.148.40.134 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-07 12:40:48,992 INFO [amun_request_handler] PortScan Detected on Port: 445 (204.148.40.134)
2019-08-07 22:34:24
150.109.196.143 attack
Aug  7 14:21:46 www sshd\[1147\]: Invalid user testftp from 150.109.196.143 port 42438
...
2019-08-07 23:08:41

Recently Reported IPs

2606:4700:10::6814:5625 2606:4700:10::6814:5590 2606:4700:10::6814:5988 2606:4700:10::6814:7656
2606:4700:10::6816:3758 2606:4700:10::ac43:1793 2606:4700:10::ac43:978 2606:4700:10::6816:4827
2606:4700:10::6814:5576 164.155.74.133 2606:4700:10::6816:4381 2606:4700:10::6814:5794
2606:4700:10::6814:4665 2606:4700:10::6814:4477 2606:4700:10::6814:5017 2606:4700:10::6816:4184
121.230.89.42 59.40.77.59 31.46.248.246 66.132.195.114