Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.97.39.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11209
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.97.39.214.			IN	A

;; AUTHORITY SECTION:
.			170	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 13:04:55 CST 2022
;; MSG SIZE  rcvd: 106
Host info
214.39.97.116.in-addr.arpa domain name pointer dynamic-ip-adsl.viettel.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.39.97.116.in-addr.arpa	name = dynamic-ip-adsl.viettel.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
114.237.109.38 attackspambots
Apr 14 23:47:31 elektron postfix/smtpd\[5859\]: NOQUEUE: reject: RCPT from unknown\[114.237.109.38\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[114.237.109.38\]\; from=\ to=\ proto=ESMTP helo=\
Apr 14 23:48:32 elektron postfix/smtpd\[9211\]: NOQUEUE: reject: RCPT from unknown\[114.237.109.38\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[114.237.109.38\]\; from=\ to=\ proto=ESMTP helo=\
Apr 14 23:49:17 elektron postfix/smtpd\[5859\]: NOQUEUE: reject: RCPT from unknown\[114.237.109.38\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[114.237.109.38\]\; from=\ to=\ proto=ESMTP helo=\
Apr 14 23:50:05 elektron postfix/smtpd\[5859\]: NOQUEUE: reject: RCPT from unknown\[114.237.109.38\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[114.237.109.38\]\; from=\ to=\
2020-04-15 06:50:49
106.13.15.122 attack
2020-04-14T15:36:31.115617linuxbox-skyline sshd[125466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.15.122  user=root
2020-04-14T15:36:32.821017linuxbox-skyline sshd[125466]: Failed password for root from 106.13.15.122 port 54160 ssh2
...
2020-04-15 06:34:31
88.7.52.91 attackspam
Automatic report - Port Scan Attack
2020-04-15 06:39:59
164.77.117.10 attackspambots
2020-04-14T22:27:41.129719shield sshd\[28861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.117.10  user=root
2020-04-14T22:27:43.295945shield sshd\[28861\]: Failed password for root from 164.77.117.10 port 33440 ssh2
2020-04-14T22:32:04.088504shield sshd\[29901\]: Invalid user flw from 164.77.117.10 port 41692
2020-04-14T22:32:04.092357shield sshd\[29901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.117.10
2020-04-14T22:32:06.028049shield sshd\[29901\]: Failed password for invalid user flw from 164.77.117.10 port 41692 ssh2
2020-04-15 06:42:55
123.176.38.67 attackbots
Invalid user john from 123.176.38.67 port 46332
2020-04-15 06:25:50
172.172.30.207 attackspambots
Hits on port : 8080
2020-04-15 06:29:07
222.89.92.196 attackbots
Invalid user test from 222.89.92.196 port 50828
2020-04-15 06:15:01
106.12.55.118 attack
SSH Login Bruteforce
2020-04-15 06:30:19
40.89.172.9 attackspambots
(sshd) Failed SSH login from 40.89.172.9 (FR/France/-): 5 in the last 3600 secs
2020-04-15 06:42:26
192.241.237.195 attackbotsspam
scan r
2020-04-15 06:53:51
202.38.153.233 attackbots
Apr 14 18:18:49 NPSTNNYC01T sshd[28197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.38.153.233
Apr 14 18:18:51 NPSTNNYC01T sshd[28197]: Failed password for invalid user local from 202.38.153.233 port 5810 ssh2
Apr 14 18:22:20 NPSTNNYC01T sshd[28487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.38.153.233
...
2020-04-15 06:44:16
114.237.109.151 attackbotsspam
SpamScore above: 10.0
2020-04-15 06:18:57
218.92.0.199 attackspambots
Apr 14 23:49:13 vmanager6029 sshd\[20289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.199  user=root
Apr 14 23:49:14 vmanager6029 sshd\[20287\]: error: PAM: Authentication failure for root from 218.92.0.199
Apr 14 23:49:15 vmanager6029 sshd\[20290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.199  user=root
2020-04-15 06:48:25
185.156.73.49 attack
Multiport scan : 22 ports scanned 9340 9343 9345 9348 9351 9354 9357 9358 9360 9361 9364 9366 9371 9378 9381 9382 9385 9386 9388 9394 9397 9398
2020-04-15 06:28:47
41.222.79.200 attack
Apr 14 17:43:01 firewall sshd[12698]: Failed password for invalid user Redistoor from 41.222.79.200 port 58614 ssh2
Apr 14 17:48:49 firewall sshd[13050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.222.79.200  user=root
Apr 14 17:48:51 firewall sshd[13050]: Failed password for root from 41.222.79.200 port 38456 ssh2
...
2020-04-15 06:43:44

Recently Reported IPs

116.97.20.182 117.0.54.215 116.97.53.80 116.96.233.250
116.96.44.143 116.91.149.38 117.1.163.43 117.0.51.188
117.13.171.123 117.14.147.64 117.143.173.185 117.15.92.161
117.136.63.173 117.156.119.31 117.151.249.150 117.155.137.214
117.139.177.209 117.150.193.27 117.153.25.75 117.155.141.48