Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.196.138.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3580
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.196.138.103.			IN	A

;; AUTHORITY SECTION:
.			187	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 12:50:56 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 103.138.196.1.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 1.196.138.103.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
91.166.58.22 attackspambots
failed root login
2019-12-10 05:30:06
151.66.46.30 attack
Automatic report - Port Scan Attack
2019-12-10 05:33:27
104.190.223.19 attack
Portscan or hack attempt detected by psad/fwsnort
2019-12-10 06:01:58
150.164.192.65 attackbotsspam
Unauthorized connection attempt detected from IP address 150.164.192.65 to port 445
2019-12-10 05:31:23
158.69.204.172 attackspam
Dec  9 22:14:09 sauna sshd[90166]: Failed password for news from 158.69.204.172 port 54278 ssh2
...
2019-12-10 05:58:26
168.205.216.34 attack
Unauthorized connection attempt detected from IP address 168.205.216.34 to port 445
2019-12-10 05:28:48
129.211.63.79 attackspambots
$f2bV_matches
2019-12-10 05:47:49
107.6.183.227 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-10 05:40:44
180.66.207.67 attackspambots
Dec  9 22:55:35 mail sshd\[26650\]: Invalid user ssh from 180.66.207.67
Dec  9 22:55:35 mail sshd\[26650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.66.207.67
Dec  9 22:55:37 mail sshd\[26650\]: Failed password for invalid user ssh from 180.66.207.67 port 53421 ssh2
...
2019-12-10 05:59:13
45.67.14.162 attack
Dec  9 15:14:03 XXX sshd[34073]: Invalid user ubnt from 45.67.14.162 port 49052
2019-12-10 05:53:47
104.236.71.107 attackbotsspam
xmlrpc attack
2019-12-10 05:42:50
77.247.109.82 attack
77.247.109.82 was recorded 57 times by 28 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 57, 269, 1202
2019-12-10 05:30:18
104.206.128.2 attackspam
1575915700 - 12/09/2019 19:21:40 Host: 104.206.128.2/104.206.128.2 Port: 21 TCP Blocked
2019-12-10 05:27:40
49.88.112.109 attack
12/09/2019-10:54:02.862577 49.88.112.109 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 50
2019-12-10 05:44:59
89.109.23.190 attackspambots
$f2bV_matches
2019-12-10 05:49:02

Recently Reported IPs

1.196.159.88 1.197.104.171 1.196.168.116 1.196.64.184
1.197.203.23 1.197.104.37 1.198.142.221 1.197.171.20
1.198.156.101 1.196.243.86 1.198.209.123 1.198.178.7
1.2.128.140 1.197.171.120 1.198.171.155 1.2.135.60
1.2.165.187 1.2.141.195 1.2.184.188 1.198.78.190