Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Mochudi

Region: Kgatleng District

Country: Botswana

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.61.210.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16870
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.61.210.132.			IN	A

;; AUTHORITY SECTION:
.			262	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 111 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:02:04 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 132.210.61.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.210.61.196.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.254.61.112 attackspam
Sep 13 17:56:39 vps01 sshd[14638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.61.112
Sep 13 17:56:40 vps01 sshd[14638]: Failed password for invalid user mysql from 27.254.61.112 port 54996 ssh2
2019-09-14 01:15:35
62.231.168.109 attackspambots
2019-09-13T17:01:19.541858abusebot-7.cloudsearch.cf sshd\[29164\]: Invalid user bot2 from 62.231.168.109 port 39500
2019-09-14 01:11:40
93.43.180.118 attack
C1,WP GET /manga/wp-login.php
2019-09-14 01:06:09
14.34.28.131 attack
Sep 13 16:51:41 lenivpn01 kernel: \[619097.764894\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=14.34.28.131 DST=195.201.121.15 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=13790 DF PROTO=TCP SPT=34500 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 
Sep 13 16:51:42 lenivpn01 kernel: \[619098.807111\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=14.34.28.131 DST=195.201.121.15 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=13791 DF PROTO=TCP SPT=34500 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 
Sep 13 16:51:44 lenivpn01 kernel: \[619100.888059\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=14.34.28.131 DST=195.201.121.15 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=13792 DF PROTO=TCP SPT=34500 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 
...
2019-09-14 01:33:32
185.153.196.233 attack
09/13/2019-10:02:22.270188 185.153.196.233 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-14 01:38:46
145.239.91.88 attackbotsspam
Sep 13 13:10:41 vps200512 sshd\[10654\]: Invalid user mc3 from 145.239.91.88
Sep 13 13:10:41 vps200512 sshd\[10654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.91.88
Sep 13 13:10:43 vps200512 sshd\[10654\]: Failed password for invalid user mc3 from 145.239.91.88 port 49916 ssh2
Sep 13 13:14:58 vps200512 sshd\[10710\]: Invalid user cloud from 145.239.91.88
Sep 13 13:14:58 vps200512 sshd\[10710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.91.88
2019-09-14 01:29:02
47.188.154.94 attackbotsspam
2019-09-13T16:53:22.285339abusebot-2.cloudsearch.cf sshd\[8779\]: Invalid user 1q2w3e4r from 47.188.154.94 port 60478
2019-09-14 01:32:54
49.88.112.90 attackbots
Sep 13 19:12:26 root sshd[6161]: Failed password for root from 49.88.112.90 port 57081 ssh2
Sep 13 19:12:30 root sshd[6161]: Failed password for root from 49.88.112.90 port 57081 ssh2
Sep 13 19:12:32 root sshd[6161]: Failed password for root from 49.88.112.90 port 57081 ssh2
...
2019-09-14 01:32:33
110.8.84.200 attackbotsspam
Unauthorised access (Sep 13) SRC=110.8.84.200 LEN=40 TTL=244 ID=44261 TCP DPT=3389 WINDOW=1024 SYN
2019-09-14 01:01:43
41.161.63.66 attackbotsspam
[Fri Sep 13 01:27:28 2019 GMT] "IMF PAYMENT OFFICERS"  [RDNS_NONE,SPOOFED_FREEM_REPTO], Subject: Re: GOODNEWS YOUR FUND IS RELEASED.
2019-09-14 01:47:50
142.93.22.180 attackbots
Sep 13 17:45:23 OPSO sshd\[24973\]: Invalid user test from 142.93.22.180 port 51106
Sep 13 17:45:23 OPSO sshd\[24973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.22.180
Sep 13 17:45:25 OPSO sshd\[24973\]: Failed password for invalid user test from 142.93.22.180 port 51106 ssh2
Sep 13 17:50:04 OPSO sshd\[25562\]: Invalid user sbserver from 142.93.22.180 port 39098
Sep 13 17:50:04 OPSO sshd\[25562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.22.180
2019-09-14 01:21:58
157.230.248.65 attackbotsspam
Sep 13 16:02:07 web8 sshd\[14841\]: Invalid user team from 157.230.248.65
Sep 13 16:02:07 web8 sshd\[14841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.248.65
Sep 13 16:02:09 web8 sshd\[14841\]: Failed password for invalid user team from 157.230.248.65 port 20817 ssh2
Sep 13 16:07:31 web8 sshd\[17396\]: Invalid user user01 from 157.230.248.65
Sep 13 16:07:31 web8 sshd\[17396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.248.65
2019-09-14 01:28:28
183.83.236.44 attack
Unauthorized connection attempt from IP address 183.83.236.44 on Port 445(SMB)
2019-09-14 01:38:03
104.244.79.222 attackspambots
Sep 13 13:51:15 thevastnessof sshd[28445]: Failed password for root from 104.244.79.222 port 56904 ssh2
...
2019-09-14 01:03:36
13.229.113.84 attackspam
scan r
2019-09-14 01:16:01

Recently Reported IPs

196.43.105.226 196.70.123.71 196.64.37.248 196.46.199.72
196.64.239.99 196.64.21.86 196.70.139.49 196.70.193.196
196.70.231.201 196.70.50.47 196.70.42.215 196.70.90.85
196.70.209.161 196.74.147.56 196.74.35.37 196.75.105.13
196.75.149.249 196.75.253.233 196.89.170.217 196.89.7.240