Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.81.14.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45486
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.81.14.195.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102501 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 26 04:18:20 CST 2022
;; MSG SIZE  rcvd: 106
Host info
b'Host 195.14.81.214.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 214.81.14.195.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
138.197.111.113 attack
30.06.2019 05:47:19 - Bad Robot 
Ignore Robots.txt
2019-06-30 12:08:14
74.82.47.31 attackspam
5900/tcp 548/tcp 5555/tcp...
[2019-04-30/06-30]59pkt,16pt.(tcp),2pt.(udp)
2019-06-30 12:07:31
119.29.98.253 attack
ssh failed login
2019-06-30 11:55:08
46.105.227.206 attackbots
Triggered by Fail2Ban
2019-06-30 12:07:50
190.73.144.47 attack
60001/tcp
[2019-06-30]1pkt
2019-06-30 12:04:41
63.240.240.74 attack
2019-06-30T03:47:00.237124abusebot-4.cloudsearch.cf sshd\[23337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.240.240.74  user=root
2019-06-30 12:20:02
159.89.177.151 attackspambots
Jun 30 04:47:44 debian sshd\[27428\]: Invalid user admin from 159.89.177.151 port 59430
Jun 30 04:47:44 debian sshd\[27428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.177.151
...
2019-06-30 11:56:09
143.208.249.10 attackspam
Lines containing failures of 143.208.249.10
2019-06-26 14:21:42 dovecot_plain authenticator failed for ([143.208.249.10]) [143.208.249.10]: 535 Incorrect authentication data (set_id=help)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=143.208.249.10
2019-06-30 12:01:51
139.59.63.244 attackbots
29.06.2019 18:47:29 SSH access blocked by firewall
2019-06-30 11:33:49
129.204.83.104 attack
29.06.2019 18:47:39 Admin application scan (phpmyadmin|webadmin|dbadmin|dbmanager|sqlitemanager|mysqldumper)
2019-06-30 11:31:32
140.143.132.167 attack
Invalid user martina from 140.143.132.167 port 57526
2019-06-30 11:37:38
123.207.96.66 attack
Jun 30 04:48:00 localhost sshd\[30196\]: Invalid user babs from 123.207.96.66 port 55346
Jun 30 04:48:00 localhost sshd\[30196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.96.66
...
2019-06-30 11:49:22
142.93.168.203 attackspam
Automatic report - Web App Attack
2019-06-30 11:29:28
114.218.138.21 attackbotsspam
Jun 29 18:04:44 warning: unknown[114.218.138.21]: SASL LOGIN authentication failed: authentication failure
Jun 29 18:04:45 warning: unknown[114.218.138.21]: SASL LOGIN authentication failed: authentication failure
Jun 29 18:04:46 warning: unknown[114.218.138.21]: SASL LOGIN authentication failed: authentication failure
2019-06-30 12:05:14
193.112.19.168 attack
30.06.2019 02:15:39 SSH access blocked by firewall
2019-06-30 11:42:19

Recently Reported IPs

63.199.75.60 225.163.88.210 3.197.101.71 213.21.186.22
3.246.41.29 192.145.108.87 66.187.131.143 237.220.107.0
147.151.27.94 106.184.12.57 243.33.174.165 12.196.11.16
83.49.233.182 47.60.48.21 146.200.187.110 217.137.207.250
209.170.43.64 46.177.15.200 74.209.206.12 141.202.188.221