Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Newark

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.193.101.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37690
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;214.193.101.158.		IN	A

;; AUTHORITY SECTION:
.			522	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100200 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 02 14:45:56 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 158.101.193.214.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 158.101.193.214.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
192.35.169.19 attackbots
1592600351 - 06/19/2020 22:59:11 Host: worker-16.sfj.censys-scanner.com/192.35.169.19 Port: 161 UDP Blocked
2020-06-20 05:57:52
74.82.47.16 attack
2323/tcp 5900/tcp 27017/tcp...
[2020-04-22/06-19]35pkt,15pt.(tcp),1pt.(udp)
2020-06-20 05:51:42
154.8.183.58 attack
2020-06-19 22:39:07,060 fail2ban.actions: WARNING [ssh] Ban 154.8.183.58
2020-06-20 05:45:39
212.70.149.82 attack
Jun 19 23:47:36 srv01 postfix/smtpd\[24406\]: warning: unknown\[212.70.149.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 19 23:47:44 srv01 postfix/smtpd\[24495\]: warning: unknown\[212.70.149.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 19 23:47:45 srv01 postfix/smtpd\[29321\]: warning: unknown\[212.70.149.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 19 23:47:45 srv01 postfix/smtpd\[24182\]: warning: unknown\[212.70.149.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 19 23:48:07 srv01 postfix/smtpd\[24495\]: warning: unknown\[212.70.149.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-20 05:48:38
106.12.73.204 attackspambots
Jun 19 22:21:26 roki-contabo sshd\[6216\]: Invalid user ut99server from 106.12.73.204
Jun 19 22:21:26 roki-contabo sshd\[6216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.73.204
Jun 19 22:21:28 roki-contabo sshd\[6216\]: Failed password for invalid user ut99server from 106.12.73.204 port 38280 ssh2
Jun 19 22:38:46 roki-contabo sshd\[6522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.73.204  user=root
Jun 19 22:38:48 roki-contabo sshd\[6522\]: Failed password for root from 106.12.73.204 port 53798 ssh2
...
2020-06-20 06:05:17
111.229.104.94 attackspam
Jun 19 14:39:35 dignus sshd[26872]: Failed password for invalid user jd from 111.229.104.94 port 35586 ssh2
Jun 19 14:43:35 dignus sshd[27338]: Invalid user jesa from 111.229.104.94 port 52776
Jun 19 14:43:35 dignus sshd[27338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.104.94
Jun 19 14:43:37 dignus sshd[27338]: Failed password for invalid user jesa from 111.229.104.94 port 52776 ssh2
Jun 19 14:47:36 dignus sshd[27777]: Invalid user spark from 111.229.104.94 port 41730
...
2020-06-20 06:03:00
93.174.95.106 attackbots
Jun 19 22:38:58 debian-2gb-nbg1-2 kernel: \[14857826.235798\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=93.174.95.106 DST=195.201.40.59 LEN=44 TOS=0x10 PREC=0x00 TTL=120 ID=21218 PROTO=TCP SPT=19330 DPT=2762 WINDOW=25153 RES=0x00 SYN URGP=0
2020-06-20 05:51:20
80.82.65.90 attackbots
SmallBizIT.US 3 packets to udp(53,123,389)
2020-06-20 06:05:53
37.49.227.202 attackspam
Unauthorized connection attempt detected from IP address 37.49.227.202 to port 81
2020-06-20 05:44:55
59.108.66.247 attackbots
$f2bV_matches
2020-06-20 06:08:56
103.7.151.146 attackspambots
Automatic report - Banned IP Access
2020-06-20 06:05:29
45.148.10.115 attack
143/tcp 2443/tcp 9443/tcp...
[2020-04-23/06-19]39pkt,17pt.(tcp)
2020-06-20 06:17:43
103.99.1.31 attack
Honeypot hit.
2020-06-20 05:50:19
114.233.8.97 attackbots
xmlrpc attack
2020-06-20 06:13:36
111.229.148.198 attackspambots
Invalid user web from 111.229.148.198 port 39034
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.148.198
Failed password for invalid user web from 111.229.148.198 port 39034 ssh2
Invalid user csj from 111.229.148.198 port 56706
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.148.198
2020-06-20 05:42:54

Recently Reported IPs

115.48.129.216 106.13.10.186 107.125.48.191 233.2.154.37
220.132.129.220 185.159.163.40 124.43.161.249 51.142.200.103
80.30.157.252 200.185.239.47 178.62.7.155 77.202.206.107
45.119.83.164 161.35.6.188 142.15.8.180 85.186.28.158
143.83.103.171 36.48.171.180 143.86.183.37 146.126.253.158