Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Windhoek

Region: Khomas

Country: Namibia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.243.196.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45414
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;197.243.196.48.			IN	A

;; AUTHORITY SECTION:
.			401	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100200 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 02 20:44:59 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 48.196.243.197.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.196.243.197.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.29.2.247 attackspam
Sep  3 13:24:21 kapalua sshd\[1748\]: Invalid user fi from 119.29.2.247
Sep  3 13:24:21 kapalua sshd\[1748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.2.247
Sep  3 13:24:23 kapalua sshd\[1748\]: Failed password for invalid user fi from 119.29.2.247 port 44975 ssh2
Sep  3 13:29:25 kapalua sshd\[2172\]: Invalid user vmail from 119.29.2.247
Sep  3 13:29:25 kapalua sshd\[2172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.2.247
2019-09-04 07:39:52
133.130.119.178 attackbotsspam
Sep  3 12:09:41 lcprod sshd\[26083\]: Invalid user russ from 133.130.119.178
Sep  3 12:09:41 lcprod sshd\[26083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v133-130-119-178.a04a.g.tyo1.static.cnode.io
Sep  3 12:09:43 lcprod sshd\[26083\]: Failed password for invalid user russ from 133.130.119.178 port 47265 ssh2
Sep  3 12:13:57 lcprod sshd\[26510\]: Invalid user oracle from 133.130.119.178
Sep  3 12:13:57 lcprod sshd\[26510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v133-130-119-178.a04a.g.tyo1.static.cnode.io
2019-09-04 08:02:00
174.138.40.132 attack
Fail2Ban Ban Triggered
2019-09-04 07:43:26
91.121.155.226 attackbotsspam
Sep  3 23:50:26 SilenceServices sshd[4406]: Failed password for root from 91.121.155.226 port 34530 ssh2
Sep  3 23:54:08 SilenceServices sshd[7270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.155.226
Sep  3 23:54:10 SilenceServices sshd[7270]: Failed password for invalid user inactive from 91.121.155.226 port 56826 ssh2
2019-09-04 07:24:55
167.71.219.1 attackspam
Sep  3 23:13:25 mail sshd\[24652\]: Failed password for invalid user ivete from 167.71.219.1 port 48056 ssh2
Sep  3 23:31:29 mail sshd\[25188\]: Invalid user lilian from 167.71.219.1 port 56166
...
2019-09-04 07:36:55
5.199.130.188 attack
v+ssh-bruteforce
2019-09-04 08:01:29
209.141.58.114 attackspam
Sep  4 01:09:22 lnxded63 sshd[32049]: Failed password for root from 209.141.58.114 port 42144 ssh2
Sep  4 01:09:25 lnxded63 sshd[32049]: Failed password for root from 209.141.58.114 port 42144 ssh2
Sep  4 01:09:27 lnxded63 sshd[32049]: Failed password for root from 209.141.58.114 port 42144 ssh2
Sep  4 01:09:30 lnxded63 sshd[32049]: Failed password for root from 209.141.58.114 port 42144 ssh2
2019-09-04 07:23:56
62.210.105.116 attack
Sep  3 13:59:55 php1 sshd\[17178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-210-105-116.rev.poneytelecom.eu  user=root
Sep  3 13:59:56 php1 sshd\[17178\]: Failed password for root from 62.210.105.116 port 38633 ssh2
Sep  3 13:59:59 php1 sshd\[17178\]: Failed password for root from 62.210.105.116 port 38633 ssh2
Sep  3 14:00:01 php1 sshd\[17178\]: Failed password for root from 62.210.105.116 port 38633 ssh2
Sep  3 14:00:04 php1 sshd\[17178\]: Failed password for root from 62.210.105.116 port 38633 ssh2
2019-09-04 08:00:30
23.129.64.213 attackspam
SSH Bruteforce attempt
2019-09-04 07:48:16
159.65.159.178 attack
Sep  4 01:17:16 legacy sshd[1231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.159.178
Sep  4 01:17:18 legacy sshd[1231]: Failed password for invalid user 123456 from 159.65.159.178 port 56676 ssh2
Sep  4 01:21:55 legacy sshd[1314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.159.178
...
2019-09-04 07:37:29
213.138.73.250 attack
SSH/22 MH Probe, BF, Hack -
2019-09-04 07:47:35
89.179.118.84 attack
Sep  3 13:31:44 hcbb sshd\[6342\]: Invalid user hp from 89.179.118.84
Sep  3 13:31:44 hcbb sshd\[6342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.179.118.84
Sep  3 13:31:46 hcbb sshd\[6342\]: Failed password for invalid user hp from 89.179.118.84 port 56128 ssh2
Sep  3 13:35:57 hcbb sshd\[6725\]: Invalid user legal1 from 89.179.118.84
Sep  3 13:35:57 hcbb sshd\[6725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.179.118.84
2019-09-04 07:41:44
91.236.239.56 attack
Sep  3 20:36:42 nexus sshd[26951]: Invalid user jb from 91.236.239.56 port 55573
Sep  3 20:36:42 nexus sshd[26951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.236.239.56
Sep  3 20:36:44 nexus sshd[26951]: Failed password for invalid user jb from 91.236.239.56 port 55573 ssh2
Sep  3 20:36:44 nexus sshd[26951]: Received disconnect from 91.236.239.56 port 55573:11: Bye Bye [preauth]
Sep  3 20:36:44 nexus sshd[26951]: Disconnected from 91.236.239.56 port 55573 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=91.236.239.56
2019-09-04 07:45:45
185.220.102.7 attack
Sep  4 01:30:37 icinga sshd[26018]: Failed password for root from 185.220.102.7 port 46581 ssh2
Sep  4 01:30:50 icinga sshd[26018]: error: maximum authentication attempts exceeded for root from 185.220.102.7 port 46581 ssh2 [preauth]
...
2019-09-04 07:34:30
191.53.223.210 attackbotsspam
Sep  3 15:38:08 msrv1 postfix/smtpd[3614]: warning: hostname 191-53-223-210.dvl-wr.mastercabo.com.br does not resolve to address 191.53.223.210: Name or service not known
Sep  3 15:38:08 msrv1 postfix/smtpd[3614]: connect from unknown[191.53.223.210]
Sep  3 15:38:12 msrv1 postfix/smtpd[3614]: lost connection after EHLO from unknown[191.53.223.210]
Sep  3 15:38:12 msrv1 postfix/smtpd[3614]: disconnect from unknown[191.53.223.210] ehlo=1 commands=1
2019-09-04 07:56:38

Recently Reported IPs

131.141.196.170 222.121.66.4 144.86.76.235 168.105.18.158
118.223.61.10 116.190.121.14 155.114.49.44 102.244.10.22
169.162.167.27 126.40.181.194 189.205.134.105 82.166.254.21
215.171.144.141 12.130.222.90 220.35.182.224 1.23.171.75
3.127.10.250 14.82.33.97 8.188.195.5 168.170.255.244