Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.54.228.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46056
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.54.228.195.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 21:16:16 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 195.228.54.214.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 214.54.228.195.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
208.115.198.54 attackbotsspam
Firewall Dropped Connection
2020-09-06 04:47:17
95.122.205.4 attackbots
Port Scan: TCP/443
2020-09-06 04:48:52
192.241.227.243 attack
Unauthorized SSH login attempts
2020-09-06 04:57:18
193.228.91.123 attack
SSH Login Bruteforce
2020-09-06 05:08:04
181.210.135.2 attackspam
Automatic report - Banned IP Access
2020-09-06 04:53:25
117.186.248.39 attackspambots
DATE:2020-09-05 18:54:44, IP:117.186.248.39, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-09-06 04:40:53
222.186.190.2 attackbotsspam
Sep  5 22:39:20 vpn01 sshd[960]: Failed password for root from 222.186.190.2 port 25244 ssh2
Sep  5 22:39:23 vpn01 sshd[960]: Failed password for root from 222.186.190.2 port 25244 ssh2
...
2020-09-06 04:42:15
71.6.135.131 attackbotsspam
firewall-block, port(s): 3001/tcp
2020-09-06 04:54:16
185.47.65.30 attack
Sep  5 23:45:28 hosting sshd[3220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host30.router40.tygrys.net  user=root
Sep  5 23:45:31 hosting sshd[3220]: Failed password for root from 185.47.65.30 port 36724 ssh2
...
2020-09-06 04:52:35
39.115.113.146 attackbotsspam
prod11
...
2020-09-06 05:03:30
104.248.216.243 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-06 04:39:10
141.98.10.212 attackbotsspam
"fail2ban match"
2020-09-06 04:57:47
198.245.61.217 attackspam
blogonese.net 198.245.61.217 [05/Sep/2020:19:36:00 +0200] "POST /wp-login.php HTTP/1.1" 200 6632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
blogonese.net 198.245.61.217 [05/Sep/2020:19:36:01 +0200] "POST /wp-login.php HTTP/1.1" 200 6632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-06 05:04:29
49.88.112.115 attackbots
[MK-VM1] SSH login failed
2020-09-06 04:39:31
148.70.14.121 attack
2020-09-05T22:39:54.552537afi-git.jinr.ru sshd[29920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.14.121
2020-09-05T22:39:54.549221afi-git.jinr.ru sshd[29920]: Invalid user run from 148.70.14.121 port 57364
2020-09-05T22:39:56.680947afi-git.jinr.ru sshd[29920]: Failed password for invalid user run from 148.70.14.121 port 57364 ssh2
2020-09-05T22:44:56.171251afi-git.jinr.ru sshd[31063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.14.121  user=root
2020-09-05T22:44:58.093640afi-git.jinr.ru sshd[31063]: Failed password for root from 148.70.14.121 port 48850 ssh2
...
2020-09-06 05:12:19

Recently Reported IPs

226.47.247.52 216.103.219.239 202.154.95.81 147.241.29.112
238.201.23.142 194.115.65.146 230.218.32.196 33.117.204.204
86.195.95.216 194.163.170.251 44.210.29.105 82.245.145.229
194.192.122.97 3.60.166.228 229.181.229.221 210.18.67.247
65.95.212.116 192.203.149.156 41.32.250.62 178.166.55.241