Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.97.122.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43372
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.97.122.41.			IN	A

;; AUTHORITY SECTION:
.			408	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:16:46 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 41.122.97.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 41.122.97.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
206.214.2.133 attackspambots
Invalid user admin from 206.214.2.133 port 57554
2019-10-27 04:05:07
118.92.93.233 attackbots
Invalid user vega from 118.92.93.233 port 50480
2019-10-27 03:47:57
193.70.8.163 attack
Invalid user PlcmSpIp from 193.70.8.163 port 56028
2019-10-27 04:07:48
103.66.16.18 attack
Invalid user kuei from 103.66.16.18 port 50462
2019-10-27 03:50:45
200.41.86.59 attack
SSH Brute-Force reported by Fail2Ban
2019-10-27 04:06:38
142.93.238.162 attackspambots
Oct 26 16:30:30 localhost sshd\[16205\]: Invalid user vnc from 142.93.238.162 port 58906
Oct 26 16:30:30 localhost sshd\[16205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.238.162
Oct 26 16:30:33 localhost sshd\[16205\]: Failed password for invalid user vnc from 142.93.238.162 port 58906 ssh2
...
2019-10-27 03:45:30
164.160.12.40 attackbotsspam
SSHScan
2019-10-27 03:41:27
140.143.59.171 attack
Invalid user akram from 140.143.59.171 port 17148
2019-10-27 03:45:44
187.32.178.33 attackbots
Invalid user lin from 187.32.178.33 port 55534
2019-10-27 03:35:16
191.14.245.42 attackspambots
Invalid user admin from 191.14.245.42 port 31791
2019-10-27 04:08:25
49.234.63.140 attack
Invalid user amavis from 49.234.63.140 port 59224
2019-10-27 03:55:49
202.137.155.190 attackspam
Invalid user admin from 202.137.155.190 port 43757
2019-10-27 04:05:55
117.232.127.50 attackbots
SSH brutforce
2019-10-27 03:48:39
106.12.96.226 attackbots
Brute force SMTP login attempted.
...
2019-10-27 03:50:15
202.29.220.186 attackspam
Oct 26 19:21:46 amit sshd\[26144\]: Invalid user pi from 202.29.220.186
Oct 26 19:21:46 amit sshd\[26145\]: Invalid user pi from 202.29.220.186
Oct 26 19:21:46 amit sshd\[26144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.220.186
Oct 26 19:21:46 amit sshd\[26145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.220.186
...
2019-10-27 03:30:41

Recently Reported IPs

157.97.120.46 158.140.170.219 157.97.89.136 158.140.182.116
158.106.77.80 158.51.125.159 158.174.185.227 158.194.196.92
158.255.7.209 158.247.225.104 158.69.236.151 158.46.86.148
158.247.7.206 158.69.59.117 158.85.189.67 159.135.236.127
159.0.217.28 159.127.162.146 159.117.172.95 159.146.46.120