Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: Telkom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.209.185.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35470
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.209.185.69.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121703 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 18 12:21:15 CST 2025
;; MSG SIZE  rcvd: 107
Host info
69.185.209.196.in-addr.arpa domain name pointer 196-209-185-69.dynamic.isadsl.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
69.185.209.196.in-addr.arpa	name = 196-209-185-69.dynamic.isadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.79.115.147 attackbotsspam
C1,WP GET /web/wp-login.php
2019-12-26 04:24:49
122.96.29.24 attackbotsspam
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 04:25:49
92.118.37.55 attackspambots
12/25/2019-15:05:32.889672 92.118.37.55 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-26 04:10:27
122.219.108.171 attack
Dec 25 01:40:42 server sshd\[8390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.bgamebox.com  user=root
Dec 25 01:40:44 server sshd\[8390\]: Failed password for root from 122.219.108.171 port 44870 ssh2
Dec 25 17:49:44 server sshd\[22514\]: Invalid user admin from 122.219.108.171
Dec 25 17:49:44 server sshd\[22514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.bgamebox.com 
Dec 25 17:49:46 server sshd\[22514\]: Failed password for invalid user admin from 122.219.108.171 port 40316 ssh2
...
2019-12-26 04:07:08
120.92.217.35 attackspambots
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 04:39:29
94.228.180.63 attack
Dec 25 14:35:43 raspberrypi sshd\[14045\]: Invalid user wpyan from 94.228.180.63Dec 25 14:35:45 raspberrypi sshd\[14045\]: Failed password for invalid user wpyan from 94.228.180.63 port 39538 ssh2Dec 25 14:58:27 raspberrypi sshd\[15535\]: Invalid user bess from 94.228.180.63
...
2019-12-26 04:20:00
138.197.130.225 attack
xmlrpc attack
2019-12-26 04:17:35
15.206.183.110 attackspam
Invalid user dortenmann from 15.206.183.110 port 36028
2019-12-26 04:28:40
37.193.108.101 attackbots
Automatic report - Banned IP Access
2019-12-26 04:17:20
95.236.10.31 attackbots
SSH/22 MH Probe, BF, Hack -
2019-12-26 04:07:54
13.235.62.138 attack
Invalid user nunzia from 13.235.62.138 port 11017
2019-12-26 04:26:38
121.136.37.239 attackbots
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 04:37:06
94.200.179.62 attackbots
SSH/22 MH Probe, BF, Hack -
2019-12-26 04:26:10
197.155.234.157 attack
2019-12-25T16:02:02.253973stark.klein-stark.info sshd\[22322\]: Invalid user gaarder from 197.155.234.157 port 35194
2019-12-25T16:02:02.262075stark.klein-stark.info sshd\[22322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.155.234.157
2019-12-25T16:02:04.407030stark.klein-stark.info sshd\[22322\]: Failed password for invalid user gaarder from 197.155.234.157 port 35194 ssh2
...
2019-12-26 04:42:49
42.117.121.153 attackbots
Unauthorized connection attempt detected from IP address 42.117.121.153 to port 445
2019-12-26 04:22:37

Recently Reported IPs

230.26.77.222 95.178.32.63 57.18.155.68 252.226.79.170
155.61.150.7 47.175.70.25 213.147.96.222 177.212.204.221
104.122.134.182 188.152.242.84 142.234.212.32 19.138.58.243
122.64.225.245 215.195.115.231 133.1.250.75 164.52.234.252
190.99.122.116 138.163.154.10 92.2.6.15 156.200.3.134