Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.106.114.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43678
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.106.114.40.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120900 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 18:01:37 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 40.114.106.197.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.114.106.197.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.14.233.82 attackspambots
Unauthorized connection attempt from IP address 103.14.233.82 on Port 445(SMB)
2020-01-08 08:48:37
117.4.153.108 attack
Unauthorized connection attempt from IP address 117.4.153.108 on Port 445(SMB)
2020-01-08 08:43:13
188.166.60.174 attackbotsspam
WordPress wp-login brute force :: 188.166.60.174 0.128 - [07/Jan/2020:21:33:44  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1806 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-01-08 08:36:43
5.128.120.135 attackbots
Unauthorized connection attempt from IP address 5.128.120.135 on Port 445(SMB)
2020-01-08 09:00:42
142.93.235.47 attack
Unauthorized connection attempt detected from IP address 142.93.235.47 to port 2220 [J]
2020-01-08 08:33:07
103.63.113.46 attack
Unauthorized connection attempt from IP address 103.63.113.46 on Port 445(SMB)
2020-01-08 09:01:59
101.109.115.27 attackspam
Unauthorized connection attempt detected from IP address 101.109.115.27 to port 22 [T]
2020-01-08 09:02:59
190.207.93.223 attackspambots
Unauthorized connection attempt from IP address 190.207.93.223 on Port 445(SMB)
2020-01-08 09:05:31
118.98.227.115 attack
(sshd) Failed SSH login from 118.98.227.115 (ID/Indonesia/227.115.cpt.kemdikbud.go.id): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jan  7 18:05:42 host sshd[91320]: Invalid user baloghl from 118.98.227.115 port 6154
2020-01-08 08:36:21
31.193.131.180 attackspam
WordPress brute force
2020-01-08 08:41:25
45.136.108.123 attackspam
Jan  8 01:48:19 debian-2gb-nbg1-2 kernel: \[703815.414705\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.136.108.123 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=30620 PROTO=TCP SPT=59431 DPT=6573 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-08 08:53:05
24.234.148.56 attackbotsspam
3389BruteforceFW21
2020-01-08 08:39:29
223.105.4.248 attack
Fail2Ban Ban Triggered
2020-01-08 08:48:03
222.186.180.6 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2020-01-08 08:34:28
81.133.112.195 attackspam
Unauthorized connection attempt detected from IP address 81.133.112.195 to port 2220 [J]
2020-01-08 09:09:50

Recently Reported IPs

25.104.54.248 38.107.22.156 249.6.151.85 5.67.131.4
223.141.26.148 123.101.40.244 138.147.150.83 96.220.246.129
227.149.103.236 217.92.201.159 223.104.231.112 216.120.145.227
38.96.63.122 202.91.112.249 14.80.141.77 116.194.81.129
220.195.118.248 167.176.153.10 188.129.238.99 46.27.140.244