Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kyiv

Region: Kyiv City

Country: Ukraine

Internet Service Provider: IT

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.214.210.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35093
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;195.214.210.54.			IN	A

;; AUTHORITY SECTION:
.			150	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102401 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 25 02:47:08 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 54.210.214.195.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 54.210.214.195.in-addr.arpa.: No answer

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
190.61.53.3 attackspam
Lines containing failures of 190.61.53.3
Mar 30 05:41:47 omfg postfix/smtpd[8881]: connect from unknown[190.61.53.3]
Mar x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.61.53.3
2020-03-30 18:22:52
80.227.12.38 attack
Bruteforce SSH honeypot
2020-03-30 18:20:56
186.234.80.21 attack
Automatic report - XMLRPC Attack
2020-03-30 17:52:07
92.63.194.47 attack
Brute-force attempt banned
2020-03-30 18:30:06
103.236.253.28 attackspambots
$f2bV_matches
2020-03-30 18:26:20
111.229.116.227 attackbots
Mar 30 11:44:00 Invalid user xcm from 111.229.116.227 port 33182
2020-03-30 18:24:31
49.234.91.116 attack
banned on SSHD
2020-03-30 18:34:10
187.87.104.62 attackbotsspam
fail2ban
2020-03-30 18:28:55
124.78.131.82 attackspam
Honeypot attack, port: 445, PTR: 82.131.78.124.broad.xw.sh.dynamic.163data.com.cn.
2020-03-30 17:58:13
23.129.64.197 attackbots
Invalid user pi from 23.129.64.197 port 47822
2020-03-30 18:00:32
180.248.157.226 attackspambots
20/3/30@01:16:34: FAIL: Alarm-Network address from=180.248.157.226
20/3/30@01:16:34: FAIL: Alarm-Network address from=180.248.157.226
...
2020-03-30 18:32:03
103.70.79.5 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-30 18:22:06
181.58.120.115 attackbotsspam
Mar 30 01:10:43 askasleikir sshd[51105]: Failed password for invalid user jix from 181.58.120.115 port 48120 ssh2
Mar 30 01:06:44 askasleikir sshd[50936]: Failed password for invalid user cpanelconnecttrack from 181.58.120.115 port 37400 ssh2
Mar 30 00:58:18 askasleikir sshd[50526]: Failed password for invalid user dbz from 181.58.120.115 port 44188 ssh2
2020-03-30 17:53:41
106.12.88.165 attackspambots
$f2bV_matches
2020-03-30 18:23:45
96.9.70.234 attackbotsspam
banned on SSHD
2020-03-30 18:22:24

Recently Reported IPs

12.9.147.152 14.33.172.103 120.136.244.200 109.4.43.149
145.13.248.189 5.64.50.246 79.254.148.99 60.165.216.163
108.202.148.135 191.227.200.35 115.235.135.152 44.230.176.8
175.79.202.231 125.110.43.175 78.66.215.20 120.9.94.223
99.36.219.253 174.202.230.125 140.250.165.197 56.158.57.157