Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.52.114.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31593
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.52.114.190.			IN	A

;; AUTHORITY SECTION:
.			419	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024061100 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 11 19:07:16 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 190.114.52.216.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 190.114.52.216.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
24.131.53.141 spambotsattack
bullied me
2021-01-10 15:13:17
151.236.35.245 attack
Host [151.236.35.245] was blocked via [DSM].
2021-01-15 06:03:55
174.97.71.241 normal
just a normal IP
2021-01-27 07:12:40
189.252.136.122 attack
Identity thief 
Fraud orders
Fraud pattern/MO established
2021-01-18 11:09:45
213.179.197.83 attack
slowing down my entire wifi
2021-01-11 10:31:42
187.109.169.110 attack
Attack brute-force RDP
2021-01-12 23:44:14
185.63.253.200 bots
Bokep
2021-01-14 01:43:21
185.153.197.180 attack
port scan
2021-01-12 04:10:11
47.146.111.179 normal
Some one stole my device it's here can you help me
2021-01-21 16:00:40
185.63.253.200 spam
185.63.253.20
2021-01-14 20:15:10
151.80.183.134 spambotsattackproxy
Last failed login: Mon Jan 18 13:33:59 CST 2021 from ip134.ip-151-80-183.eu on ssh:notty
There were 61042 failed login attempts since the last successful login.
2021-01-18 13:58:43
43.225.3.188 spambotsattackproxynormal
Received: from 10.207.150.11
 by atlas207.free.mail.sg3.yahoo.com with HTTP; Tue, 26 Jan 2021 03:38:50 +0000
Return-Path: 
Received: from 154.16.159.26 (EHLO beermedia.net)
 by 10.207.150.11 with SMTPs; Tue, 26 Jan 2021 03:38:50 +0000
X-Originating-Ip: [154.16.159.26]
Received-SPF: pass (domain of beermedia.net designates 154.16.159.26 as permitted sender)
Authentication-Results: atlas207.free.mail.sg3.yahoo.com;
 dkim=pass header.i=@beermedia.net header.s=mail;
 spf=pass smtp.mailfrom=beermedia.net;
 dmarc=pass(p=QUARANTINE) header.from=beermedia.net;
X-Apparently-To: made_ash@yahoo.co.in; Tue, 26 Jan 2021 03:38:50 +0000
X-YMailISG: aBSM.DIWLDs.5bH4SHQ2xTt.wdkx40YlBDAB1u1d8C8CHkwE
 eRvxZ0f2Zv3hpFoLYVXTDCvLwkCRLQDtz79wGdNukbVGzrtBIz2CsZTFXHpU
 8VU3n_rAaWKBRhGRoulCPagbt2gElcs5AxCKmUqD7Z1Ptpczu7K5Kco5DfJn

This is spamming people since years now...
2021-01-26 19:45:31
2600:387:b:9a2::50 attacknormal
Ip banned from multiple websites fro this IP. Pro tip, im on a mobilr device NOT in washington where it says its at. So... Yeah.
2021-01-19 01:20:17
144.76.102.2 spamattack
Phishing scheme for btc with false promises of more.
2021-01-16 00:09:29
185.63.253.200 attack
Mantap
2021-01-26 21:39:12

Recently Reported IPs

30.68.128.147 241.35.113.95 251.34.216.118 108.59.97.250
103.54.209.157 114.15.252.238 30.236.76.38 35.89.34.4
200.55.173.82 137.128.143.90 173.242.86.50 112.101.170.4
119.65.206.182 32.213.108.127 110.33.86.144 112.218.238.136
44.147.188.93 118.27.5.203 86.148.225.191 49.71.232.136