Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: London

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '195.140.214.16 - 195.140.214.31'

% Abuse contact for '195.140.214.16 - 195.140.214.31' is 'abuse@infrawat.ch'

inetnum:        195.140.214.16 - 195.140.214.31
netname:        INFRAWATCH
remarks:        -----------------------------------------------------
remarks:        Real time internet intelligence data
remarks:        infrawat.ch
remarks:        -----------------------------------------------------
country:        GB
geoloc:         51.494840911758295 -0.018682268947961784
org:            ORG-IL948-RIPE
admin-c:        LD7399-RIPE
tech-c:         LD7399-RIPE
status:         ASSIGNED PA
created:        2026-03-26T04:41:57Z
last-modified:  2026-03-27T02:01:08Z
source:         RIPE
mnt-by:         HYDRA-MNT

organisation:   ORG-IL948-RIPE
org-name:       Infrawatch Limited
org-type:       OTHER
address:        128 City Road
address:        London
address:        EC1V 2NX
country:        GB
abuse-c:        ACRO64026-RIPE
mnt-ref:        HYDRA-MNT
created:        2026-03-26T04:32:13Z
last-modified:  2026-03-26T04:32:13Z
source:         RIPE # Filtered
mnt-by:         HYDRA-MNT

person:         Lloyd Davies
address:        128 City Road
address:        London
address:        EC1V 2NX
address:        United Kingdom
phone:          +448000803330
nic-hdl:        LD7399-RIPE
created:        2026-03-26T04:34:31Z
last-modified:  2026-03-26T04:34:31Z
source:         RIPE # Filtered
mnt-by:         HYDRA-MNT

% Information related to '195.140.212.0/22AS25369'

route:          195.140.212.0/22
origin:         AS25369
mnt-by:         HYDRA-MNT
created:        2018-06-28T01:47:08Z
last-modified:  2018-06-28T01:47:08Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.140.214.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8426
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.140.214.30.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040201 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 09:00:49 CST 2026
;; MSG SIZE  rcvd: 107
Host info
30.214.140.195.in-addr.arpa domain name pointer 30.214.140.195.infrawat.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
30.214.140.195.in-addr.arpa	name = 30.214.140.195.infrawat.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.128.150.158 attackbotsspam
2019-07-26T19:43:27.410173abusebot-2.cloudsearch.cf sshd\[17808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.150.158  user=root
2019-07-27 10:00:01
111.10.43.223 attackbots
Jul 26 22:33:53 localhost sshd\[5314\]: Invalid user 123@pass123 from 111.10.43.223
Jul 26 22:33:53 localhost sshd\[5314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.10.43.223
Jul 26 22:33:55 localhost sshd\[5314\]: Failed password for invalid user 123@pass123 from 111.10.43.223 port 35442 ssh2
Jul 26 22:35:37 localhost sshd\[5498\]: Invalid user Snowbal from 111.10.43.223
Jul 26 22:35:37 localhost sshd\[5498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.10.43.223
...
2019-07-27 09:57:36
103.51.153.235 attackspambots
2019-07-26T19:43:25.351570abusebot-2.cloudsearch.cf sshd\[17803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.51.153.235  user=root
2019-07-27 10:01:07
202.45.147.118 attack
27.07.2019 02:12:30 SSH access blocked by firewall
2019-07-27 10:12:55
201.251.10.200 attackbotsspam
Repeated brute force against a port
2019-07-27 09:37:10
94.102.51.31 attackspam
proto=tcp  .  spt=46997  .  dpt=3389  .  src=94.102.51.31  .  dst=xx.xx.4.1  .     (listed on CINS badguys  Jul 26)     (583)
2019-07-27 10:08:27
179.182.6.191 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-25 17:17:59,301 INFO [shellcode_manager] (179.182.6.191) no match, writing hexdump (48d5cb8bfd07f566511c19ba478bcad7 :2296344) - MS17010 (EternalBlue)
2019-07-27 10:04:03
112.85.42.89 attackspambots
Jul 27 03:39:08 dcd-gentoo sshd[8237]: User root from 112.85.42.89 not allowed because none of user's groups are listed in AllowGroups
Jul 27 03:39:10 dcd-gentoo sshd[8237]: error: PAM: Authentication failure for illegal user root from 112.85.42.89
Jul 27 03:39:08 dcd-gentoo sshd[8237]: User root from 112.85.42.89 not allowed because none of user's groups are listed in AllowGroups
Jul 27 03:39:10 dcd-gentoo sshd[8237]: error: PAM: Authentication failure for illegal user root from 112.85.42.89
Jul 27 03:39:08 dcd-gentoo sshd[8237]: User root from 112.85.42.89 not allowed because none of user's groups are listed in AllowGroups
Jul 27 03:39:10 dcd-gentoo sshd[8237]: error: PAM: Authentication failure for illegal user root from 112.85.42.89
Jul 27 03:39:10 dcd-gentoo sshd[8237]: Failed keyboard-interactive/pam for invalid user root from 112.85.42.89 port 18587 ssh2
...
2019-07-27 09:50:59
159.65.146.250 attackbots
Jul 26 23:52:58 MK-Soft-VM3 sshd\[7767\]: Invalid user com from 159.65.146.250 port 45270
Jul 26 23:52:58 MK-Soft-VM3 sshd\[7767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.146.250
Jul 26 23:53:00 MK-Soft-VM3 sshd\[7767\]: Failed password for invalid user com from 159.65.146.250 port 45270 ssh2
...
2019-07-27 09:47:09
95.215.204.152 attack
2019-07-27T02:01:54.054425abusebot-7.cloudsearch.cf sshd\[6496\]: Invalid user @dmin!@\# from 95.215.204.152 port 47404
2019-07-27 10:13:27
37.10.112.73 attackbotsspam
Invalid user dear from 37.10.112.73 port 49314
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.10.112.73
Failed password for invalid user dear from 37.10.112.73 port 49314 ssh2
Invalid user faeces from 37.10.112.73 port 48240
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.10.112.73
2019-07-27 09:58:44
37.208.44.54 attack
utm - spam
2019-07-27 10:09:14
180.233.123.220 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-25 17:23:02,434 INFO [shellcode_manager] (180.233.123.220) no match, writing hexdump (a2fb4ce91e7f15ead981d4bb5b9628ba :2259293) - MS17010 (EternalBlue)
2019-07-27 10:21:29
181.54.45.9 attackspam
Automatic report - Banned IP Access
2019-07-27 09:58:08
41.39.47.39 attackspambots
WordPress wp-login brute force :: 41.39.47.39 0.168 BYPASS [27/Jul/2019:05:43:32  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-27 09:55:53

Recently Reported IPs

14.29.7.57 198.168.100.52 2606:4700:10::6814:4652 2606:4700:10::6814:6310
2606:4700:10::ac43:1948 2606:4700:10::6816:4346 2606:4700:10::6814:6085 14.207.194.186
2606:4700:10::6816:3592 2606:4700:10::ac43:2230 2606:4700:10::6814:8889 2606:4700:10::6814:5401
2606:4700:10::6814:5737 143.92.60.205 183.202.134.16 134.122.197.16
195.140.214.26 75.240.98.76 6.240.223.59 21.194.25.163