Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Khomas

Country: Namibia

Internet Service Provider: MTN Namibia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.188.254.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29216
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.188.254.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121101 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 02:29:06 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 13.254.188.197.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.254.188.197.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
105.225.26.201 attack
Automatic report - Port Scan Attack
2020-08-28 15:17:02
198.46.249.205 attackspambots
Aug 27 23:31:31 propaganda sshd[9367]: Disconnected from 198.46.249.205 port 56507 [preauth]
2020-08-28 15:11:19
103.97.33.96 attackspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-08-28 15:04:56
51.158.70.82 attack
Invalid user web from 51.158.70.82 port 41014
2020-08-28 15:20:07
91.237.239.38 attack
Brute force attempt
2020-08-28 15:10:35
192.141.107.58 attackspambots
2020-08-28T08:52:32.725306mail.standpoint.com.ua sshd[23152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.141.107.58
2020-08-28T08:52:32.722259mail.standpoint.com.ua sshd[23152]: Invalid user radio from 192.141.107.58 port 39144
2020-08-28T08:52:34.482966mail.standpoint.com.ua sshd[23152]: Failed password for invalid user radio from 192.141.107.58 port 39144 ssh2
2020-08-28T08:57:04.397111mail.standpoint.com.ua sshd[23786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.141.107.58  user=root
2020-08-28T08:57:06.164697mail.standpoint.com.ua sshd[23786]: Failed password for root from 192.141.107.58 port 47914 ssh2
...
2020-08-28 15:44:05
128.199.73.25 attackbots
Invalid user rdt from 128.199.73.25 port 55462
2020-08-28 15:21:40
210.56.23.100 attackbotsspam
<6 unauthorized SSH connections
2020-08-28 15:28:21
210.12.168.79 attackbotsspam
SSH bruteforce
2020-08-28 15:35:48
203.175.9.151 attackspambots
FTP: login Brute Force attempt , PTR: PTR record not found
2020-08-28 15:24:16
101.78.3.29 attack
$f2bV_matches
2020-08-28 15:30:04
220.133.36.112 attack
Invalid user jail from 220.133.36.112 port 51739
2020-08-28 15:01:05
81.219.94.162 attackspambots
Aug 27 22:52:00 mailman postfix/smtpd[32685]: warning: 81-219-94-162.ostmedia.pl[81.219.94.162]: SASL PLAIN authentication failed: authentication failure
2020-08-28 15:43:27
194.62.29.226 attackspam
2020-08-28 06:45:24 H=(xxxxxxxejugend.de) [194.62.29.226] F=: Unknown user


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=194.62.29.226
2020-08-28 15:37:20
158.69.0.38 attack
Invalid user wangxh from 158.69.0.38 port 53506
2020-08-28 15:34:31

Recently Reported IPs

144.165.253.245 218.242.189.182 254.101.111.193 17.206.32.234
127.102.85.78 157.93.193.169 67.239.55.94 96.161.219.117
25.187.5.29 53.165.159.2 181.26.183.51 241.39.199.122
48.106.194.87 49.86.0.95 233.42.93.201 127.4.194.69
230.63.7.248 47.42.7.196 22.154.211.66 51.120.210.167