Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.196.14.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38815
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.196.14.16.			IN	A

;; AUTHORITY SECTION:
.			532	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102100 1800 900 604800 86400

;; Query time: 141 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 22 02:39:51 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 16.14.196.102.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 16.14.196.102.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
137.74.100.75 attack
SpamReport
2019-11-28 15:00:32
182.74.25.246 attack
2019-11-28T07:24:44.791649abusebot-8.cloudsearch.cf sshd\[10809\]: Invalid user admin from 182.74.25.246 port 62894
2019-11-28 15:29:43
218.92.0.176 attack
$f2bV_matches
2019-11-28 15:39:41
185.156.177.119 attack
2019-11-28T07:08:27Z - RDP login failed multiple times. (185.156.177.119)
2019-11-28 15:31:00
148.72.100.62 attackbots
Automatic report - XMLRPC Attack
2019-11-28 15:32:07
45.55.233.213 attackbotsspam
Nov 28 07:49:51 lnxweb62 sshd[17330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.233.213
Nov 28 07:49:51 lnxweb62 sshd[17330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.233.213
2019-11-28 15:39:13
194.102.35.245 attack
Automatic report - Banned IP Access
2019-11-28 14:57:34
59.27.125.131 attackbotsspam
Nov 28 07:26:08 vps691689 sshd[8050]: Failed password for root from 59.27.125.131 port 53603 ssh2
Nov 28 07:29:56 vps691689 sshd[8096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.27.125.131
...
2019-11-28 15:18:37
222.186.180.147 attackbots
Nov 28 02:21:04 plusreed sshd[30751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
Nov 28 02:21:06 plusreed sshd[30751]: Failed password for root from 222.186.180.147 port 20092 ssh2
...
2019-11-28 15:23:04
178.207.12.10 attackbotsspam
Automatic report - Port Scan Attack
2019-11-28 14:59:14
112.26.44.112 attackbots
Jan 26 15:27:59 microserver sshd[34556]: Invalid user miner from 112.26.44.112 port 47307
Jan 26 15:27:59 microserver sshd[34556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.26.44.112
Jan 26 15:28:02 microserver sshd[34556]: Failed password for invalid user miner from 112.26.44.112 port 47307 ssh2
Jan 26 15:32:52 microserver sshd[35030]: Invalid user miner from 112.26.44.112 port 58427
Jan 26 15:32:52 microserver sshd[35030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.26.44.112
Jan 28 13:11:29 microserver sshd[32601]: Invalid user db from 112.26.44.112 port 44747
Jan 28 13:11:29 microserver sshd[32601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.26.44.112
Jan 28 13:11:31 microserver sshd[32601]: Failed password for invalid user db from 112.26.44.112 port 44747 ssh2
Jan 28 13:16:21 microserver sshd[33129]: Invalid user oracle from 112.26.44.112 port 55754
Jan 28 13:
2019-11-28 15:35:25
159.90.82.120 attack
Lines containing failures of 159.90.82.120
Nov 26 17:30:12 shared11 sshd[21889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.90.82.120  user=www-data
Nov 26 17:30:13 shared11 sshd[21889]: Failed password for www-data from 159.90.82.120 port 19277 ssh2
Nov 26 17:30:13 shared11 sshd[21889]: Received disconnect from 159.90.82.120 port 19277:11: Bye Bye [preauth]
Nov 26 17:30:13 shared11 sshd[21889]: Disconnected from authenticating user www-data 159.90.82.120 port 19277 [preauth]
Nov 26 18:09:50 shared11 sshd[1832]: Invalid user smulowicz from 159.90.82.120 port 28141
Nov 26 18:09:50 shared11 sshd[1832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.90.82.120
Nov 26 18:09:52 shared11 sshd[1832]: Failed password for invalid user smulowicz from 159.90.82.120 port 28141 ssh2
Nov 26 18:09:52 shared11 sshd[1832]: Received disconnect from 159.90.82.120 port 28141:11: Bye Bye [preauth]
No........
------------------------------
2019-11-28 15:34:06
211.149.188.81 attack
brute force on FTP
2019-11-28 15:29:03
218.92.0.147 attackspambots
Nov 28 08:30:09 ns381471 sshd[28383]: Failed password for root from 218.92.0.147 port 49393 ssh2
Nov 28 08:30:22 ns381471 sshd[28383]: error: maximum authentication attempts exceeded for root from 218.92.0.147 port 49393 ssh2 [preauth]
2019-11-28 15:33:24
31.184.198.138 attackspambots
Unauthorized access or intrusion attempt detected from Bifur banned IP
2019-11-28 15:10:21

Recently Reported IPs

102.196.47.247 102.195.8.168 102.196.175.155 102.196.235.186
102.196.177.101 102.196.186.195 102.196.49.245 102.196.70.23
102.194.19.96 102.196.86.128 102.196.205.22 102.197.103.225
102.196.239.140 102.196.209.126 102.196.138.111 102.197.112.21
102.196.41.20 102.197.115.241 102.196.135.253 102.196.246.33