Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Congo (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.214.145.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36060
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.214.145.238.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 04:17:51 CST 2025
;; MSG SIZE  rcvd: 108
Host info
238.145.214.197.in-addr.arpa domain name pointer 238-145-214-197.r.airtel.cg.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
238.145.214.197.in-addr.arpa	name = 238-145-214-197.r.airtel.cg.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
207.154.225.170 attackspam
Jul  1 06:52:55 fr01 sshd[3622]: Invalid user admin1 from 207.154.225.170
Jul  1 06:52:55 fr01 sshd[3622]: Invalid user admin1 from 207.154.225.170
Jul  1 06:52:55 fr01 sshd[3622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.225.170
Jul  1 06:52:55 fr01 sshd[3622]: Invalid user admin1 from 207.154.225.170
Jul  1 06:52:57 fr01 sshd[3622]: Failed password for invalid user admin1 from 207.154.225.170 port 54380 ssh2
...
2019-07-01 15:35:14
87.98.165.250 attackbots
xmlrpc attack
2019-07-01 16:15:52
190.119.190.122 attackbotsspam
Jun 30 23:16:40 debian sshd[1133]: Unable to negotiate with 190.119.190.122 port 40112: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
Jul  1 03:18:22 debian sshd[7687]: Unable to negotiate with 190.119.190.122 port 33366: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
...
2019-07-01 15:39:19
121.166.247.50 attack
1561953083 - 07/01/2019 10:51:23 Host: 121.166.247.50/121.166.247.50 Port: 23 TCP Blocked
...
2019-07-01 16:23:43
95.87.14.47 attackspam
2019-07-01T05:51:46.447286 X postfix/smtpd[51637]: NOQUEUE: reject: RCPT from ip-95-87-14-47.trakiacable.bg[95.87.14.47]: 554 5.7.1 Service unavailable; Client host [95.87.14.47] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?95.87.14.47; from= to= proto=ESMTP helo=
2019-07-01 16:10:27
187.111.152.142 attackspambots
libpam_shield report: forced login attempt
2019-07-01 16:26:33
102.130.64.30 attackspam
Jul  1 00:46:50 srv01 postfix/smtpd[29407]: connect from unknown[102.130.64.30]
Jul x@x
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=102.130.64.30
2019-07-01 16:27:11
37.49.224.204 attackspambots
Jul  1 08:16:59 dcd-gentoo sshd[26852]: Invalid user admin from 37.49.224.204 port 52493
Jul  1 08:17:01 dcd-gentoo sshd[26852]: error: PAM: Authentication failure for illegal user admin from 37.49.224.204
Jul  1 08:16:59 dcd-gentoo sshd[26852]: Invalid user admin from 37.49.224.204 port 52493
Jul  1 08:17:01 dcd-gentoo sshd[26852]: error: PAM: Authentication failure for illegal user admin from 37.49.224.204
Jul  1 08:16:59 dcd-gentoo sshd[26852]: Invalid user admin from 37.49.224.204 port 52493
Jul  1 08:17:01 dcd-gentoo sshd[26852]: error: PAM: Authentication failure for illegal user admin from 37.49.224.204
Jul  1 08:17:01 dcd-gentoo sshd[26852]: Failed keyboard-interactive/pam for invalid user admin from 37.49.224.204 port 52493 ssh2
...
2019-07-01 16:24:23
203.99.118.2 attack
Jul  1 03:01:25 mxgate1 postfix/postscreen[12157]: CONNECT from [203.99.118.2]:39458 to [176.31.12.44]:25
Jul  1 03:01:25 mxgate1 postfix/dnsblog[12160]: addr 203.99.118.2 listed by domain cbl.abuseat.org as 127.0.0.2
Jul  1 03:01:25 mxgate1 postfix/dnsblog[12161]: addr 203.99.118.2 listed by domain zen.spamhaus.org as 127.0.0.3
Jul  1 03:01:25 mxgate1 postfix/dnsblog[12161]: addr 203.99.118.2 listed by domain zen.spamhaus.org as 127.0.0.4
Jul  1 03:01:25 mxgate1 postfix/dnsblog[12159]: addr 203.99.118.2 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul  1 03:01:25 mxgate1 postfix/dnsblog[12719]: addr 203.99.118.2 listed by domain b.barracudacentral.org as 127.0.0.2
Jul  1 03:01:31 mxgate1 postfix/postscreen[12157]: DNSBL rank 5 for [203.99.118.2]:39458
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=203.99.118.2
2019-07-01 16:08:40
168.181.61.154 attack
Jul  1 07:12:57 our-server-hostname postfix/smtpd[29912]: connect from unknown[168.181.61.154]
Jul x@x
Jul x@x
Jul x@x
Jul  1 07:13:02 our-server-hostname postfix/smtpd[29912]: lost connection after RCPT from unknown[168.181.61.154]
Jul  1 07:13:02 our-server-hostname postfix/smtpd[29912]: disconnect from unknown[168.181.61.154]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=168.181.61.154
2019-07-01 16:26:03
91.137.250.39 attackspam
NAME : MEZGANET-HU CIDR :  DDoS attack Hungary "" - block certain countries :) IP: 91.137.250.39  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-07-01 16:02:01
14.102.76.10 attackbots
SPF Fail sender not permitted to send mail for @1919ic.com
2019-07-01 15:51:19
189.211.85.194 attackbots
ssh failed login
2019-07-01 15:57:26
200.108.130.50 attack
2019-07-01T13:49:40.322404enmeeting.mahidol.ac.th sshd\[21061\]: Invalid user grassi from 200.108.130.50 port 33674
2019-07-01T13:49:40.341395enmeeting.mahidol.ac.th sshd\[21061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.130.50
2019-07-01T13:49:42.463484enmeeting.mahidol.ac.th sshd\[21061\]: Failed password for invalid user grassi from 200.108.130.50 port 33674 ssh2
...
2019-07-01 16:18:25
207.154.243.255 attack
$f2bV_matches
2019-07-01 16:11:51

Recently Reported IPs

95.176.228.142 18.78.56.19 52.95.222.153 36.22.248.127
215.39.142.219 41.131.250.10 25.157.133.15 116.241.19.165
133.234.16.121 242.63.61.30 61.43.159.20 154.99.175.96
125.83.71.225 14.225.33.217 160.135.80.64 156.232.132.70
44.125.29.56 26.192.240.228 206.1.91.48 191.120.22.20