Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.119.241.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58239
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;159.119.241.196.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jun 21 19:16:50 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 196.241.119.159.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 196.241.119.159.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
105.154.245.41 attackspam
[Mon Jan 13 08:41:53 2020] Failed password for invalid user user from 105.154.245.41 port 51430 ssh2
[Mon Jan 13 08:42:10 2020] Failed password for invalid user user from 105.154.245.41 port 54833 ssh2
[Mon Jan 13 08:44:06 2020] Failed password for invalid user user from 105.154.245.41 port 62352 ssh2
[Mon Jan 13 08:46:42 2020] Failed password for invalid user user from 105.154.245.41 port 61404 ssh2
[Mon Jan 13 08:46:52 2020] Failed password for invalid user user from 105.154.245.41 port 63213 ssh2
[Mon Jan 13 08:48:04 2020] Failed password for invalid user user from 105.154.245.41 port 61272 ssh2
[Mon Jan 13 08:48:22 2020] Failed password for invalid user user from 105.154.245.41 port 65155 ssh2
[Mon Jan 13 08:50:44 2020] Failed password for invalid user user from 105.154.245.41 port 60726 ssh2
[Mon Jan 13 08:51:32 2020] Failed password for invalid user user from 105.154.245.41 port 53584 ssh2
[Mon Jan 13 08:52:24 2020] Failed password for invalid user user from 105.1........
-------------------------------
2020-01-14 00:30:00
156.198.102.124 attack
Honeypot attack, port: 445, PTR: host-156.198.124.102-static.tedata.net.
2020-01-14 00:36:52
59.91.78.136 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-14 00:03:53
77.42.90.209 attack
Automatic report - Port Scan Attack
2020-01-14 00:03:33
193.56.28.151 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-14 00:16:17
58.218.213.141 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-14 00:16:00
41.38.203.171 attackbots
Automatic report - Port Scan Attack
2020-01-14 00:44:03
194.44.199.49 attack
scan z
2020-01-14 00:15:16
203.215.176.50 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-14 00:21:04
111.95.141.34 attackspambots
Unauthorized connection attempt detected from IP address 111.95.141.34 to port 2220 [J]
2020-01-14 00:33:47
189.222.164.69 attack
Honeypot attack, port: 81, PTR: 189.222.164.69.dsl.dyn.telnor.net.
2020-01-14 00:05:27
217.219.217.81 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-14 00:17:06
97.97.168.94 attack
Unauthorized connection attempt detected from IP address 97.97.168.94 to port 80 [J]
2020-01-14 00:08:55
68.196.16.160 attack
RDP Bruteforce
2020-01-14 00:06:01
128.14.209.236 attackspambots
Honeypot attack, port: 81, PTR: survey.internet-census.org.
2020-01-14 00:43:04

Recently Reported IPs

31.182.16.66 115.188.169.134 248.57.211.253 246.58.106.41
90.169.184.147 85.209.90.153 180.104.6.147 103.255.4.41
183.189.200.98 14.246.205.184 27.153.141.168 94.177.240.17
95.131.145.86 178.140.93.201 197.48.243.211 108.59.8.70
211.141.124.163 14.186.134.233 185.131.191.77 14.253.36.94