Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ethiopia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.154.138.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29807
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.154.138.91.			IN	A

;; AUTHORITY SECTION:
.			120	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010901 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 13:37:47 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 91.138.154.197.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 91.138.154.197.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.136.109.33 attackspambots
Sep 11 18:24:59 mc1 kernel: \[769664.710925\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.33 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=8301 PROTO=TCP SPT=44546 DPT=2721 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 11 18:29:16 mc1 kernel: \[769921.516077\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.33 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=20316 PROTO=TCP SPT=44546 DPT=2289 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 11 18:30:56 mc1 kernel: \[770021.926485\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.33 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=53488 PROTO=TCP SPT=44546 DPT=2354 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-12 00:43:01
89.248.168.202 attackbots
09/11/2019-11:09:51.823318 89.248.168.202 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 100
2019-09-12 00:28:36
94.20.55.169 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(09111103)
2019-09-12 02:01:18
185.176.27.18 attackbots
Excessive Port-Scanning
2019-09-12 01:02:27
77.247.108.77 attackspambots
09/11/2019-12:43:59.839624 77.247.108.77 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 75
2019-09-12 01:34:44
77.247.110.156 attack
" "
2019-09-12 00:32:24
185.254.122.216 attackbots
Sep 11 04:19:53 lenivpn01 kernel: \[401196.915488\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.254.122.216 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=33359 PROTO=TCP SPT=58016 DPT=33902 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 11 08:45:02 lenivpn01 kernel: \[417105.331501\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.254.122.216 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=4621 PROTO=TCP SPT=58016 DPT=33903 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 11 11:17:58 lenivpn01 kernel: \[426281.104206\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.254.122.216 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=28259 PROTO=TCP SPT=58016 DPT=33900 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 11 11:23:11 lenivpn01 kernel: \[426594.445017\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.254.122.216 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 T
...
2019-09-12 00:04:34
45.136.109.38 attackspambots
Sep 10 18:28:50 lenivpn01 kernel: \[365734.849668\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.38 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=25337 PROTO=TCP SPT=50516 DPT=6006 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 10 18:34:22 lenivpn01 kernel: \[366066.642794\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.38 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=17398 PROTO=TCP SPT=50516 DPT=6800 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 10 18:36:12 lenivpn01 kernel: \[366176.962211\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.38 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=48492 PROTO=TCP SPT=50516 DPT=6074 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 10 21:04:16 lenivpn01 kernel: \[375060.613315\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.38 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=
...
2019-09-12 00:39:37
92.118.37.86 attackbots
Attempted to connect 3 times to port 3408 TCP
2019-09-12 02:02:36
67.36.84.226 attackbots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(09111103)
2019-09-12 02:09:40
185.176.27.174 attack
Portscan or hack attempt detected by psad/fwsnort
2019-09-12 01:50:21
92.53.65.97 attackspam
RU - 1H : (139)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN49505 
 
 IP : 92.53.65.97 
 
 CIDR : 92.53.65.0/24 
 
 PREFIX COUNT : 347 
 
 UNIQUE IP COUNT : 124928 
 
 
 WYKRYTE ATAKI Z ASN49505 :  
  1H - 5 
  3H - 7 
  6H - 11 
 12H - 13 
 24H - 22 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-12 01:26:49
207.226.155.196 attackspambots
Unauthorised access (Sep 11) SRC=207.226.155.196 LEN=40 TTL=243 ID=55254 TCP DPT=445 WINDOW=1024 SYN
2019-09-12 00:54:29
198.108.67.93 attackspambots
firewall-block, port(s): 3059/tcp
2019-09-12 01:43:48
185.244.25.248 attackbotsspam
port 23 attempt blocked
2019-09-12 00:06:56

Recently Reported IPs

255.193.233.89 113.88.253.104 127.101.12.204 131.222.203.158
119.56.75.214 134.190.56.161 157.247.182.199 118.88.159.15
235.155.132.24 140.108.217.125 233.94.175.77 166.145.130.19
127.29.12.149 110.112.116.236 153.64.239.193 175.163.16.30
15.116.54.80 127.223.77.173 171.60.106.198 159.44.91.221