Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.216.137.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34523
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.216.137.131.		IN	A

;; AUTHORITY SECTION:
.			491	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 10:06:55 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 131.137.216.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 131.137.216.196.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
84.54.122.69 attackspambots
Email rejected due to spam filtering
2020-05-30 14:50:02
190.53.171.193 attack
Email rejected due to spam filtering
2020-05-30 15:00:43
2.133.38.150 attackbots
Email rejected due to spam filtering
2020-05-30 15:08:49
5.181.151.151 attackbotsspam
May 30 03:37:19 vps46666688 sshd[7314]: Failed password for root from 5.181.151.151 port 37812 ssh2
...
2020-05-30 14:42:26
120.92.34.203 attackspam
Invalid user admin from 120.92.34.203 port 16460
2020-05-30 15:16:51
182.254.145.29 attackspambots
Invalid user server from 182.254.145.29 port 49304
2020-05-30 15:25:59
37.13.139.189 attackbotsspam
Automatic report - Port Scan Attack
2020-05-30 15:10:55
123.31.32.150 attack
May 30 05:10:31 game-panel sshd[32565]: Failed password for root from 123.31.32.150 port 55030 ssh2
May 30 05:12:27 game-panel sshd[32664]: Failed password for root from 123.31.32.150 port 51652 ssh2
May 30 05:14:28 game-panel sshd[32758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.32.150
2020-05-30 14:47:49
167.71.134.241 attackspam
SSH brute force attempt
2020-05-30 14:58:37
1.234.13.176 attack
$f2bV_matches
2020-05-30 15:16:25
218.56.160.82 attackbotsspam
Invalid user gasiago from 218.56.160.82 port 43989
2020-05-30 15:22:45
181.174.106.25 attackspambots
Email rejected due to spam filtering
2020-05-30 15:12:34
31.14.40.111 attackspambots
123/udp
[2020-05-30]1pkt
2020-05-30 14:56:34
118.201.65.165 attack
2020-05-29T23:50:40.486397devel sshd[22520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.201.65.165
2020-05-29T23:50:40.480392devel sshd[22520]: Invalid user admin from 118.201.65.165 port 55029
2020-05-29T23:50:42.733657devel sshd[22520]: Failed password for invalid user admin from 118.201.65.165 port 55029 ssh2
2020-05-30 15:21:38
87.255.211.194 attackspam
Email rejected due to spam filtering
2020-05-30 15:02:58

Recently Reported IPs

191.240.117.120 187.163.84.104 204.2.255.137 123.14.81.232
115.23.15.232 219.157.5.232 168.194.37.113 109.166.145.226
45.133.1.6 75.99.233.171 59.89.221.151 58.253.50.235
45.250.38.92 184.82.235.135 179.174.6.98 123.57.158.230
138.204.226.158 5.79.193.234 188.51.161.140 59.96.31.13