Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.156.16.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41533
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.156.16.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 20:48:15 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 140.16.156.197.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.16.156.197.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.176.27.166 attack
21.06.2019 04:05:58 Connection to port 46963 blocked by firewall
2019-06-21 12:08:53
197.44.234.201 attackspambots
Automatic report - Web App Attack
2019-06-21 13:19:50
198.199.94.14 attackbotsspam
198.199.94.14 - - \[21/Jun/2019:06:46:39 +0200\] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
198.199.94.14 - - \[21/Jun/2019:06:46:45 +0200\] "POST /wp-login.php HTTP/1.1" 200 1524 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
198.199.94.14 - - \[21/Jun/2019:06:46:51 +0200\] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
198.199.94.14 - - \[21/Jun/2019:06:46:53 +0200\] "POST /wp-login.php HTTP/1.1" 200 1507 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
198.199.94.14 - - \[21/Jun/2019:06:46:56 +0200\] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
198.199.94.14 - - \[21/Jun/2019:06:47:05 +0200\] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\)
2019-06-21 12:51:05
81.174.4.122 attackbotsspam
3389BruteforceFW22
2019-06-21 13:27:18
5.83.182.102 attackspam
Jun 21 05:53:31 reporting4 sshd[27954]: Invalid user admin from 5.83.182.102
Jun 21 05:53:31 reporting4 sshd[27954]: Failed none for invalid user admin from 5.83.182.102 port 55107 ssh2
Jun 21 05:53:33 reporting4 sshd[27954]: Failed password for invalid user admin from 5.83.182.102 port 55107 ssh2
Jun 21 05:54:40 reporting4 sshd[28900]: Invalid user admin from 5.83.182.102
Jun 21 05:54:40 reporting4 sshd[28900]: Failed none for invalid user admin from 5.83.182.102 port 40578 ssh2
Jun 21 05:54:42 reporting4 sshd[28900]: Failed password for invalid user admin from 5.83.182.102 port 40578 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.83.182.102
2019-06-21 12:09:30
103.48.190.114 attackspambots
103.48.190.114 - - \[21/Jun/2019:06:45:14 +0200\] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.48.190.114 - - \[21/Jun/2019:06:45:16 +0200\] "POST /wp-login.php HTTP/1.1" 200 1524 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.48.190.114 - - \[21/Jun/2019:06:45:18 +0200\] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.48.190.114 - - \[21/Jun/2019:06:45:19 +0200\] "POST /wp-login.php HTTP/1.1" 200 1507 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.48.190.114 - - \[21/Jun/2019:06:45:21 +0200\] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.48.190.114 - - \[21/Jun/2019:06:45:23 +0200\] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:6
2019-06-21 13:19:19
218.92.0.210 attack
ssh爆破
2019-06-14 16:40:24
222.98.37.25 attackbotsspam
Jun 17 06:20:00 sd1 sshd[1886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.98.37.25  user=r.r
Jun 17 06:20:02 sd1 sshd[1886]: Failed password for r.r from 222.98.37.25 port 18168 ssh2
Jun 17 06:25:50 sd1 sshd[2278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.98.37.25  user=r.r
Jun 17 06:25:52 sd1 sshd[2278]: Failed password for r.r from 222.98.37.25 port 41347 ssh2
Jun 17 06:28:09 sd1 sshd[2383]: Invalid user ursula from 222.98.37.25

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=222.98.37.25
2019-06-21 12:51:38
140.143.239.156 attackbotsspam
ssh failed login
2019-06-21 12:50:48
139.59.74.143 spam
SCAMMERS!!!
2019-06-21 03:09:55
68.160.224.34 attack
Jun 17 11:13:55 cumulus sshd[11381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.160.224.34  user=r.r
Jun 17 11:13:57 cumulus sshd[11381]: Failed password for r.r from 68.160.224.34 port 49191 ssh2
Jun 17 11:13:57 cumulus sshd[11381]: Received disconnect from 68.160.224.34 port 49191:11: Bye Bye [preauth]
Jun 17 11:13:57 cumulus sshd[11381]: Disconnected from 68.160.224.34 port 49191 [preauth]
Jun 17 11:18:44 cumulus sshd[11824]: Invalid user nfs from 68.160.224.34 port 49009
Jun 17 11:18:44 cumulus sshd[11824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.160.224.34
Jun 17 11:18:46 cumulus sshd[11824]: Failed password for invalid user nfs from 68.160.224.34 port 49009 ssh2
Jun 17 11:18:46 cumulus sshd[11824]: Received disconnect from 68.160.224.34 port 49009:11: Bye Bye [preauth]
Jun 17 11:18:46 cumulus sshd[11824]: Disconnected from 68.160.224.34 port 49009 [preauth]


........
--------------------------------------
2019-06-21 13:22:42
131.255.82.160 attack
20 attempts against mh-ssh on lake.magehost.pro
2019-06-21 12:49:52
188.163.109.153 attack
Automatic report - Web App Attack
2019-06-21 13:21:08
209.17.96.82 attackbots
port scan and connect, tcp 88 (kerberos-sec)
2019-06-21 13:13:31
47.254.89.228 attack
xmlrpc attack
2019-06-21 13:11:52

Recently Reported IPs

21.158.48.98 114.23.27.192 141.187.183.72 161.138.139.188
64.162.101.209 200.76.34.127 82.133.22.203 141.192.62.180
70.83.43.135 167.187.222.123 59.37.62.212 35.88.211.98
30.179.209.139 229.7.231.81 59.156.58.32 83.151.96.79
61.67.10.236 186.50.122.117 210.235.208.242 129.249.254.148