Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.101.216.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65072
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.101.216.193.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 20:28:02 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 193.216.101.214.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 214.101.216.193.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
45.118.34.143 attackspambots
(smtpauth) Failed SMTP AUTH login from 45.118.34.143 (IN/India/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-09-07 05:57:24 plain authenticator failed for ([45.118.34.143]) [45.118.34.143]: 535 Incorrect authentication data (set_id=info)
2020-09-07 14:59:46
64.227.0.92 attackbotsspam
invalid user
2020-09-07 15:00:58
106.75.141.160 attack
Sep  7 09:21:15 ip106 sshd[27329]: Failed password for root from 106.75.141.160 port 44922 ssh2
Sep  7 09:23:58 ip106 sshd[27423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.160 
...
2020-09-07 16:03:10
109.110.167.217 attackspambots
Honeypot attack, port: 445, PTR: 109-110-167-217-dynamic.shabdiznet.com.
2020-09-07 15:21:08
49.234.56.138 attackspam
Sep  5 17:53:56 woof sshd[13292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.56.138  user=r.r
Sep  5 17:53:58 woof sshd[13292]: Failed password for r.r from 49.234.56.138 port 50218 ssh2
Sep  5 17:53:58 woof sshd[13292]: Received disconnect from 49.234.56.138: 11: Bye Bye [preauth]
Sep  5 18:02:13 woof sshd[13854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.56.138  user=r.r
Sep  5 18:02:15 woof sshd[13854]: Failed password for r.r from 49.234.56.138 port 35694 ssh2
Sep  5 18:02:16 woof sshd[13854]: Received disconnect from 49.234.56.138: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.234.56.138
2020-09-07 15:19:16
149.202.175.255 attackspambots
ssh brute force
2020-09-07 15:58:39
105.242.150.10 attackbots
Automatic report - Banned IP Access
2020-09-07 15:05:30
122.51.254.201 attackbots
2020-09-07T04:56:11.646336paragon sshd[184826]: Invalid user fedor from 122.51.254.201 port 35868
2020-09-07T04:56:11.650338paragon sshd[184826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.254.201
2020-09-07T04:56:11.646336paragon sshd[184826]: Invalid user fedor from 122.51.254.201 port 35868
2020-09-07T04:56:13.540732paragon sshd[184826]: Failed password for invalid user fedor from 122.51.254.201 port 35868 ssh2
2020-09-07T05:00:14.839030paragon sshd[184919]: Invalid user test from 122.51.254.201 port 53670
...
2020-09-07 15:13:12
122.51.68.119 attackspambots
bruteforce detected
2020-09-07 15:52:04
167.71.134.241 attackbots
firewall-block, port(s): 25719/tcp
2020-09-07 15:55:50
144.34.196.101 attack
Failed password for root from 144.34.196.101 port 41010 ssh2
2020-09-07 15:11:10
104.46.32.174 attackbotsspam
Unauthorised login to NAS
2020-09-07 16:02:18
109.227.63.3 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2020-09-07 15:08:05
104.131.118.160 attackbots
Sep  2 01:42:33 bbl sshd[30823]: Did not receive identification string from 104.131.118.160 port 51928
Sep  2 01:43:20 bbl sshd[3577]: Received disconnect from 104.131.118.160 port 49256:11: Normal Shutdown, Thank you for playing [preauth]
Sep  2 01:43:20 bbl sshd[3577]: Disconnected from 104.131.118.160 port 49256 [preauth]
Sep  2 01:43:43 bbl sshd[6163]: Invalid user ftpuser from 104.131.118.160 port 44062
Sep  2 01:43:43 bbl sshd[6163]: Received disconnect from 104.131.118.160 port 44062:11: Normal Shutdown, Thank you for playing [preauth]
Sep  2 01:43:43 bbl sshd[6163]: Disconnected from 104.131.118.160 port 44062 [preauth]
Sep  2 01:44:07 bbl sshd[8872]: Invalid user ghostname from 104.131.118.160 port 38862
Sep  2 01:44:07 bbl sshd[8872]: Received disconnect from 104.131.118.160 port 38862:11: Normal Shutdown, Thank you for playing [preauth]
Sep  2 01:44:07 bbl sshd[8872]: Disconnected from 104.131.118.160 port 38862 [preauth]
Sep  2 01:44:31 bbl sshd[12270]: Inva........
-------------------------------
2020-09-07 16:00:31
94.176.187.142 attackbotsspam
Unauthorised access (Sep  7) SRC=94.176.187.142 LEN=52 TTL=117 ID=25822 DF TCP DPT=445 WINDOW=8192 SYN
2020-09-07 15:06:05

Recently Reported IPs

89.10.248.107 93.53.153.254 15.173.29.58 222.97.187.81
228.56.5.192 188.83.179.159 33.115.40.117 116.240.240.137
166.89.30.210 251.162.226.102 61.158.212.7 117.194.252.18
124.130.238.220 116.29.51.232 253.127.75.119 97.152.196.219
193.86.89.130 96.116.124.111 25.62.221.105 64.19.82.158