Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Chile

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.116.138.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15838
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;191.116.138.214.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082802 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 29 07:27:34 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 214.138.116.191.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 214.138.116.191.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.199.248.153 attackspambots
Oct  8 20:06:17 vps691689 sshd[7427]: Failed password for root from 139.199.248.153 port 35168 ssh2
Oct  8 20:10:39 vps691689 sshd[7490]: Failed password for root from 139.199.248.153 port 42362 ssh2
...
2019-10-09 02:21:19
84.193.199.205 attackspambots
port scan and connect, tcp 23 (telnet)
2019-10-09 02:53:57
175.107.198.23 attackspambots
Oct  8 18:01:26 vps sshd[13106]: Failed password for root from 175.107.198.23 port 38297 ssh2
Oct  8 18:15:48 vps sshd[14035]: Failed password for root from 175.107.198.23 port 49413 ssh2
...
2019-10-09 02:26:13
206.189.166.172 attackspam
2019-10-08T17:04:30.508845abusebot-6.cloudsearch.cf sshd\[3694\]: Invalid user support from 206.189.166.172 port 60020
2019-10-09 02:22:35
113.125.25.73 attack
2019-10-08T18:21:17.445874abusebot-3.cloudsearch.cf sshd\[15571\]: Invalid user Viper@123 from 113.125.25.73 port 55480
2019-10-09 02:48:27
198.108.66.71 attackbots
Port scan: Attack repeated for 24 hours
2019-10-09 02:43:46
170.238.46.6 attackspam
Oct  8 20:13:54 meumeu sshd[13213]: Failed password for root from 170.238.46.6 port 48996 ssh2
Oct  8 20:18:24 meumeu sshd[13897]: Failed password for root from 170.238.46.6 port 58836 ssh2
...
2019-10-09 02:40:23
183.131.82.99 attackspam
Oct  8 18:28:41 game-panel sshd[10990]: Failed password for root from 183.131.82.99 port 40685 ssh2
Oct  8 18:28:43 game-panel sshd[10990]: Failed password for root from 183.131.82.99 port 40685 ssh2
Oct  8 18:28:45 game-panel sshd[10990]: Failed password for root from 183.131.82.99 port 40685 ssh2
2019-10-09 02:35:49
195.133.216.215 attack
2019-10-08T09:23:44.8818611495-001 sshd\[9656\]: Failed password for root from 195.133.216.215 port 46614 ssh2
2019-10-08T09:36:10.3374601495-001 sshd\[10540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-133-216-215.in-addr.mastertelecom.ru  user=root
2019-10-08T09:36:12.5670711495-001 sshd\[10540\]: Failed password for root from 195.133.216.215 port 51392 ssh2
2019-10-08T09:40:23.2302321495-001 sshd\[10744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-133-216-215.in-addr.mastertelecom.ru  user=root
2019-10-08T09:40:25.7112791495-001 sshd\[10744\]: Failed password for root from 195.133.216.215 port 34166 ssh2
2019-10-08T09:44:28.9516191495-001 sshd\[11064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-133-216-215.in-addr.mastertelecom.ru  user=root
...
2019-10-09 02:25:28
142.93.248.5 attack
Oct  8 15:55:45 vps691689 sshd[3462]: Failed password for root from 142.93.248.5 port 52992 ssh2
Oct  8 15:59:51 vps691689 sshd[3573]: Failed password for root from 142.93.248.5 port 36092 ssh2
...
2019-10-09 02:49:18
138.97.2.32 attackbotsspam
Oct  8 21:58:03 our-server-hostname postfix/smtpd[30836]: connect from unknown[138.97.2.32]
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=138.97.2.32
2019-10-09 02:27:45
114.38.85.166 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/114.38.85.166/ 
 TW - 1H : (343)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 114.38.85.166 
 
 CIDR : 114.38.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 15 
  3H - 34 
  6H - 96 
 12H - 186 
 24H - 332 
 
 DateTime : 2019-10-08 13:48:05 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-09 02:47:39
191.232.249.186 attack
Oct  8 06:41:28 foo sshd[11314]: Did not receive identification string from 191.232.249.186
Oct  8 06:44:04 foo sshd[11336]: Invalid user kafka from 191.232.249.186
Oct  8 06:44:04 foo sshd[11336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.249.186 
Oct  8 06:44:06 foo sshd[11336]: Failed password for invalid user kafka from 191.232.249.186 port 56888 ssh2
Oct  8 06:44:06 foo sshd[11336]: Received disconnect from 191.232.249.186: 11: Normal Shutdown, Thank you for playing [preauth]
Oct  8 06:45:23 foo sshd[11397]: Invalid user kafka from 191.232.249.186
Oct  8 06:45:23 foo sshd[11397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.249.186 
Oct  8 06:45:25 foo sshd[11397]: Failed password for invalid user kafka from 191.232.249.186 port 60282 ssh2
Oct  8 06:45:25 foo sshd[11397]: Received disconnect from 191.232.249.186: 11: Normal Shutdown, Thank you for playing [preau........
-------------------------------
2019-10-09 02:23:08
54.36.150.171 attackbotsspam
Automatic report - Banned IP Access
2019-10-09 02:55:55
113.188.69.122 attack
Oct  8 13:38:58 tux postfix/smtpd[18359]: warning: hostname static.vnpt.vn does not resolve to address 113.188.69.122
Oct  8 13:38:58 tux postfix/smtpd[18359]: connect from unknown[113.188.69.122]
Oct x@x
Oct  8 13:38:59 tux postfix/smtpd[18359]: lost connection after DATA from unknown[113.188.69.122]
Oct  8 13:38:59 tux postfix/smtpd[18359]: disconnect from unknown[113.188.69.122]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.188.69.122
2019-10-09 02:52:15

Recently Reported IPs

114.117.218.87 122.54.41.183 128.164.234.254 224.71.51.223
137.37.246.192 52.171.130.108 106.87.44.65 78.94.190.155
142.93.132.42 111.20.153.238 79.126.90.245 212.64.38.9
159.89.188.167 106.13.149.88 104.27.170.94 110.185.138.107
122.160.74.105 45.125.140.134 86.11.159.45 190.117.146.212