Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.193.156.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26979
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.193.156.214.		IN	A

;; AUTHORITY SECTION:
.			234	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 01:31:53 CST 2022
;; MSG SIZE  rcvd: 108
Host info
214.156.193.212.in-addr.arpa domain name pointer cdn.ngenix.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.156.193.212.in-addr.arpa	name = cdn.ngenix.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
20.52.34.10 attackbotsspam
Unauthorized SSH login attempts
2020-07-15 17:25:01
52.252.52.30 attack
Jul 15 11:09:29 rancher-0 sshd[331879]: Invalid user admin from 52.252.52.30 port 41093
...
2020-07-15 17:23:35
141.98.10.197 attack
Jul 15 06:18:14 dns1 sshd[12043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.197 
Jul 15 06:18:16 dns1 sshd[12043]: Failed password for invalid user admin from 141.98.10.197 port 46737 ssh2
Jul 15 06:19:02 dns1 sshd[12099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.197
2020-07-15 17:26:53
103.145.12.195 attackbotsspam
scan
2020-07-15 17:49:01
192.82.64.12 attack
Unauthorized connection attempt from IP address 192.82.64.12 on Port 445(SMB)
2020-07-15 17:52:48
113.181.123.167 attack
Unauthorized connection attempt from IP address 113.181.123.167 on Port 445(SMB)
2020-07-15 17:34:45
13.75.147.74 attackspam
Jul 15 08:06:10 takio sshd[4468]: Invalid user admin from 13.75.147.74 port 12738
Jul 15 08:06:10 takio sshd[4468]: Failed password for invalid user admin from 13.75.147.74 port 12738 ssh2
Jul 15 11:59:09 takio sshd[11992]: Invalid user admin from 13.75.147.74 port 52759
Jul 15 11:59:09 takio sshd[11992]: Failed password for invalid user admin from 13.75.147.74 port 52759 ssh2
2020-07-15 17:17:47
62.219.155.66 attackspambots
20/7/14@22:00:09: FAIL: Alarm-Network address from=62.219.155.66
20/7/14@22:00:09: FAIL: Alarm-Network address from=62.219.155.66
...
2020-07-15 17:56:42
132.148.241.6 attackspam
132.148.241.6 - - [15/Jul/2020:08:15:46 +0100] "POST /wp-login.php HTTP/1.1" 200 1973 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.241.6 - - [15/Jul/2020:08:15:48 +0100] "POST /wp-login.php HTTP/1.1" 200 2024 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.241.6 - - [15/Jul/2020:08:15:50 +0100] "POST /wp-login.php HTTP/1.1" 200 2018 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-15 17:32:33
192.241.239.19 attack
Port scan denied
2020-07-15 17:33:57
119.90.100.200 attackbotsspam
Auto Detect Rule!
proto TCP (SYN), 119.90.100.200:50047->gjan.info:1433, len 40
2020-07-15 17:52:14
77.220.140.53 attack
2020-07-15T10:16:53.467608mail.broermann.family sshd[436]: Invalid user bpi from 77.220.140.53 port 44060
2020-07-15T10:16:53.473586mail.broermann.family sshd[436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.220.140.53
2020-07-15T10:16:53.467608mail.broermann.family sshd[436]: Invalid user bpi from 77.220.140.53 port 44060
2020-07-15T10:16:55.435051mail.broermann.family sshd[436]: Failed password for invalid user bpi from 77.220.140.53 port 44060 ssh2
2020-07-15T10:21:11.258225mail.broermann.family sshd[709]: Invalid user redmine from 77.220.140.53 port 40720
...
2020-07-15 17:49:17
207.154.235.23 attackbotsspam
5x Failed Password
2020-07-15 17:43:04
112.45.114.75 attack
SMTP:25. 29 login attempts in 331.7 days.
2020-07-15 17:18:21
210.19.55.210 attack
1594778419 - 07/15/2020 04:00:19 Host: 210.19.55.210/210.19.55.210 Port: 445 TCP Blocked
2020-07-15 17:30:51

Recently Reported IPs

212.193.156.210 212.193.156.242 212.193.156.250 212.193.155.83
212.193.155.127 212.193.157.112 212.193.156.146 212.193.157.119
212.193.157.216 212.193.157.43 212.193.157.75 212.193.158.156
212.193.158.154 212.193.158.165 212.193.158.131 212.193.158.178
212.193.157.78 212.193.157.22 212.193.158.252 212.193.157.227