Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.198.9.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49472
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.198.9.4.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 07:39:47 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 4.9.198.137.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 137.198.9.4.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
193.70.40.191 attackspambots
Oct  7 08:27:34 vps647732 sshd[535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.40.191
Oct  7 08:27:36 vps647732 sshd[535]: Failed password for invalid user pierre from 193.70.40.191 port 33836 ssh2
...
2019-10-07 14:41:43
177.68.148.10 attack
Oct  6 19:56:08 kapalua sshd\[17545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.68.148.10  user=root
Oct  6 19:56:10 kapalua sshd\[17545\]: Failed password for root from 177.68.148.10 port 12546 ssh2
Oct  6 20:00:34 kapalua sshd\[17928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.68.148.10  user=root
Oct  6 20:00:36 kapalua sshd\[17928\]: Failed password for root from 177.68.148.10 port 12497 ssh2
Oct  6 20:05:09 kapalua sshd\[18272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.68.148.10  user=root
2019-10-07 14:09:25
182.243.36.119 attackspambots
Multiple failed FTP logins
2019-10-07 14:25:16
222.186.175.6 attack
Oct  6 18:50:54 roadrisk sshd[9905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.6  user=r.r
Oct  6 18:50:55 roadrisk sshd[9905]: Failed password for r.r from 222.186.175.6 port 49694 ssh2
Oct  6 18:50:59 roadrisk sshd[9905]: Failed password for r.r from 222.186.175.6 port 49694 ssh2
Oct  6 18:51:03 roadrisk sshd[9905]: Failed password for r.r from 222.186.175.6 port 49694 ssh2
Oct  6 18:51:08 roadrisk sshd[9905]: Failed password for r.r from 222.186.175.6 port 49694 ssh2
Oct  6 18:51:13 roadrisk sshd[9905]: Failed password for r.r from 222.186.175.6 port 49694 ssh2
Oct  6 18:51:13 roadrisk sshd[9905]: Disconnecting: Too many authentication failures for r.r from 222.186.175.6 port 49694 ssh2 [preauth]
Oct  6 18:51:13 roadrisk sshd[9905]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.6  user=r.r
Oct  6 18:51:22 roadrisk sshd[9909]: pam_unix(sshd:auth): authentication fail........
-------------------------------
2019-10-07 14:21:55
42.7.187.157 attackbotsspam
Unauthorised access (Oct  7) SRC=42.7.187.157 LEN=40 TTL=49 ID=7429 TCP DPT=8080 WINDOW=26983 SYN 
Unauthorised access (Oct  6) SRC=42.7.187.157 LEN=40 TTL=49 ID=25146 TCP DPT=8080 WINDOW=26983 SYN
2019-10-07 14:33:05
118.143.198.3 attack
Oct  7 08:01:14 jane sshd[30985]: Failed password for root from 118.143.198.3 port 22362 ssh2
...
2019-10-07 14:19:54
134.175.241.163 attackbotsspam
Oct  7 06:51:46 ArkNodeAT sshd\[14613\]: Invalid user p4\$\$word1 from 134.175.241.163
Oct  7 06:51:46 ArkNodeAT sshd\[14613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.241.163
Oct  7 06:51:47 ArkNodeAT sshd\[14613\]: Failed password for invalid user p4\$\$word1 from 134.175.241.163 port 32058 ssh2
2019-10-07 14:23:09
220.120.106.254 attackbots
Oct  7 07:07:43 www sshd\[29922\]: Invalid user !qaZ@wsX\#edC  from 220.120.106.254
Oct  7 07:07:43 www sshd\[29922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.120.106.254
Oct  7 07:07:44 www sshd\[29922\]: Failed password for invalid user !qaZ@wsX\#edC  from 220.120.106.254 port 45332 ssh2
...
2019-10-07 14:43:21
193.112.206.73 attack
Oct  7 01:05:58 garuda sshd[652149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.206.73  user=r.r
Oct  7 01:06:00 garuda sshd[652149]: Failed password for r.r from 193.112.206.73 port 38216 ssh2
Oct  7 01:06:00 garuda sshd[652149]: Received disconnect from 193.112.206.73: 11: Bye Bye [preauth]
Oct  7 01:19:55 garuda sshd[655209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.206.73  user=r.r
Oct  7 01:19:57 garuda sshd[655209]: Failed password for r.r from 193.112.206.73 port 55140 ssh2
Oct  7 01:19:57 garuda sshd[655209]: Received disconnect from 193.112.206.73: 11: Bye Bye [preauth]
Oct  7 01:23:26 garuda sshd[656128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.206.73  user=r.r
Oct  7 01:23:28 garuda sshd[656128]: Failed password for r.r from 193.112.206.73 port 32840 ssh2
Oct  7 01:23:28 garuda sshd[656128]: Receiv........
-------------------------------
2019-10-07 14:33:54
222.186.180.223 attack
Oct  6 18:26:07 debian sshd[30404]: Unable to negotiate with 222.186.180.223 port 56048: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
Oct  7 02:11:26 debian sshd[19338]: Unable to negotiate with 222.186.180.223 port 2128: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
...
2019-10-07 14:26:37
49.88.112.113 attackspam
Oct  7 07:54:40 minden010 sshd[4374]: Failed password for root from 49.88.112.113 port 26391 ssh2
Oct  7 07:55:22 minden010 sshd[4918]: Failed password for root from 49.88.112.113 port 10046 ssh2
Oct  7 07:55:24 minden010 sshd[4918]: Failed password for root from 49.88.112.113 port 10046 ssh2
...
2019-10-07 14:44:33
106.13.58.170 attackbotsspam
SSH Bruteforce attack
2019-10-07 14:14:38
51.68.215.113 attack
Oct  7 12:43:50 lcl-usvr-02 sshd[10875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.215.113  user=root
Oct  7 12:43:52 lcl-usvr-02 sshd[10875]: Failed password for root from 51.68.215.113 port 51314 ssh2
Oct  7 12:47:27 lcl-usvr-02 sshd[11745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.215.113  user=root
Oct  7 12:47:28 lcl-usvr-02 sshd[11745]: Failed password for root from 51.68.215.113 port 34932 ssh2
Oct  7 12:51:09 lcl-usvr-02 sshd[12575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.215.113  user=root
Oct  7 12:51:11 lcl-usvr-02 sshd[12575]: Failed password for root from 51.68.215.113 port 46776 ssh2
...
2019-10-07 14:46:50
118.34.12.35 attackspam
2019-10-07T05:54:40.609199shield sshd\[5281\]: Invalid user CENTOS@123 from 118.34.12.35 port 51600
2019-10-07T05:54:40.614604shield sshd\[5281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.12.35
2019-10-07T05:54:42.456981shield sshd\[5281\]: Failed password for invalid user CENTOS@123 from 118.34.12.35 port 51600 ssh2
2019-10-07T05:59:15.924416shield sshd\[5725\]: Invalid user CENTOS@123 from 118.34.12.35 port 35150
2019-10-07T05:59:15.929162shield sshd\[5725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.12.35
2019-10-07 14:13:02
60.215.35.143 attack
Unauthorised access (Oct  7) SRC=60.215.35.143 LEN=40 TTL=49 ID=43459 TCP DPT=8080 WINDOW=28775 SYN
2019-10-07 14:07:10

Recently Reported IPs

234.7.133.171 101.1.10.166 237.96.27.61 26.12.116.48
99.177.158.187 15.212.232.198 132.154.216.86 58.174.120.44
89.167.217.48 139.224.18.121 131.71.118.93 29.111.90.235
91.110.7.200 173.22.103.221 164.9.84.224 251.27.6.9
91.251.98.7 131.237.10.27 237.153.183.114 46.62.125.56