Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.116.197.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33199
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.116.197.194.		IN	A

;; AUTHORITY SECTION:
.			140	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022072202 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 23 06:26:17 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 194.197.116.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.197.116.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
148.70.191.149 attackbots
Jun  5 20:02:18 haigwepa sshd[2288]: Failed password for root from 148.70.191.149 port 36534 ssh2
...
2020-06-06 02:12:01
141.98.81.99 attackspam
Jun  5 15:51:25 vmd48417 sshd[17209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.99
2020-06-06 02:13:16
14.161.43.154 attackspam
Invalid user admin from 14.161.43.154 port 34683
2020-06-06 01:57:43
103.25.21.34 attack
Invalid user uftp from 103.25.21.34 port 6347
2020-06-06 02:26:15
103.98.176.248 attackbotsspam
Jun  5 07:37:15 dignus sshd[28161]: Failed password for root from 103.98.176.248 port 50314 ssh2
Jun  5 07:38:53 dignus sshd[28290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.98.176.248  user=root
Jun  5 07:38:55 dignus sshd[28290]: Failed password for root from 103.98.176.248 port 40734 ssh2
Jun  5 07:40:36 dignus sshd[28458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.98.176.248  user=root
Jun  5 07:40:38 dignus sshd[28458]: Failed password for root from 103.98.176.248 port 57410 ssh2
...
2020-06-06 02:25:42
41.202.166.215 attackspambots
Invalid user admin from 41.202.166.215 port 46967
2020-06-06 01:51:30
114.141.132.88 attackspambots
Automatic report BANNED IP
2020-06-06 02:19:32
202.175.46.170 attack
$f2bV_matches
2020-06-06 02:01:23
139.59.60.220 attackbotsspam
prod8
...
2020-06-06 02:15:32
148.229.3.242 attackbotsspam
Jun  5 17:06:33 XXX sshd[62165]: Invalid user ahernando from 148.229.3.242 port 35673
2020-06-06 02:11:40
213.6.130.133 attack
Invalid user admin1 from 213.6.130.133 port 50458
2020-06-06 01:59:32
175.125.95.160 attackbotsspam
Jun  5 14:26:32 ws25vmsma01 sshd[110629]: Failed password for root from 175.125.95.160 port 45232 ssh2
...
2020-06-06 02:10:11
141.98.81.83 attackbots
 TCP (SYN) 141.98.81.83:42191 -> port 22, len 60
2020-06-06 02:13:55
59.24.190.73 attackspambots
Invalid user support from 59.24.190.73 port 7521
2020-06-06 02:31:23
181.174.81.244 attackspam
2020-06-05T19:20:30.351251billing sshd[17056]: Failed password for root from 181.174.81.244 port 57390 ssh2
2020-06-05T19:22:06.022932billing sshd[20644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.174.81.244  user=root
2020-06-05T19:22:08.411082billing sshd[20644]: Failed password for root from 181.174.81.244 port 36182 ssh2
...
2020-06-06 02:07:06

Recently Reported IPs

159.117.231.125 159.114.18.232 159.122.152.80 159.117.174.165
159.117.103.159 159.116.177.106 159.117.2.206 159.115.221.204
159.116.242.187 159.116.144.150 159.118.195.115 159.118.173.155
159.116.54.118 159.116.38.224 159.116.22.17 159.116.6.17
159.116.212.43 159.125.155.36 159.116.153.81 159.116.241.60