Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ghana

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.253.67.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40191
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.253.67.104.			IN	A

;; AUTHORITY SECTION:
.			384	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 22:43:37 CST 2022
;; MSG SIZE  rcvd: 107
Host info
104.67.253.197.in-addr.arpa domain name pointer cwhm4.nita.gov.gh.
104.67.253.197.in-addr.arpa domain name pointer www.moc.gov.gh.
104.67.253.197.in-addr.arpa domain name pointer arc.gov.gh.
104.67.253.197.in-addr.arpa domain name pointer bgl.gov.gh.
104.67.253.197.in-addr.arpa domain name pointer moc.gov.gh.
104.67.253.197.in-addr.arpa domain name pointer www.uwrcc.gov.gh.
104.67.253.197.in-addr.arpa domain name pointer www.arc.gov.gh.
104.67.253.197.in-addr.arpa domain name pointer anda.gov.gh.
104.67.253.197.in-addr.arpa domain name pointer tipis.gov.gh.
104.67.253.197.in-addr.arpa domain name pointer oma.gov.gh.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.67.253.197.in-addr.arpa	name = www.uwrcc.gov.gh.
104.67.253.197.in-addr.arpa	name = www.arc.gov.gh.
104.67.253.197.in-addr.arpa	name = anda.gov.gh.
104.67.253.197.in-addr.arpa	name = tipis.gov.gh.
104.67.253.197.in-addr.arpa	name = oma.gov.gh.
104.67.253.197.in-addr.arpa	name = cwhm4.nita.gov.gh.
104.67.253.197.in-addr.arpa	name = www.moc.gov.gh.
104.67.253.197.in-addr.arpa	name = arc.gov.gh.
104.67.253.197.in-addr.arpa	name = bgl.gov.gh.
104.67.253.197.in-addr.arpa	name = moc.gov.gh.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
142.93.213.91 attackbotsspam
142.93.213.91 - - [28/Sep/2020:23:30:04 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.213.91 - - [28/Sep/2020:23:30:06 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.213.91 - - [28/Sep/2020:23:30:08 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-29 05:47:35
218.92.0.165 attack
Failed password for invalid user from 218.92.0.165 port 55199 ssh2
2020-09-29 05:50:20
104.248.147.20 attack
Sep 28 17:18:16 server sshd[19603]: Failed password for invalid user new from 104.248.147.20 port 49194 ssh2
Sep 28 17:20:40 server sshd[20916]: Failed password for invalid user laravel from 104.248.147.20 port 50160 ssh2
Sep 28 17:22:43 server sshd[21989]: Failed password for invalid user mauro from 104.248.147.20 port 50066 ssh2
2020-09-29 05:38:14
165.227.127.49 attackbots
165.227.127.49 - - \[28/Sep/2020:22:15:49 +0200\] "POST /wp-login.php HTTP/1.1" 200 12843 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
165.227.127.49 - - \[28/Sep/2020:22:15:50 +0200\] "POST /wp-login.php HTTP/1.1" 200 12678 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2020-09-29 06:08:04
5.182.211.36 attackspambots
spammer
2020-09-29 05:53:05
138.197.66.68 attack
Sep 28 17:31:47 NPSTNNYC01T sshd[1700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68
Sep 28 17:31:49 NPSTNNYC01T sshd[1700]: Failed password for invalid user mysql from 138.197.66.68 port 42160 ssh2
Sep 28 17:35:40 NPSTNNYC01T sshd[1982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68
...
2020-09-29 05:38:45
106.52.205.81 attackspambots
Time:     Sun Sep 27 10:40:22 2020 +0000
IP:       106.52.205.81 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 27 10:19:14 3 sshd[25665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.205.81  user=root
Sep 27 10:19:16 3 sshd[25665]: Failed password for root from 106.52.205.81 port 49364 ssh2
Sep 27 10:28:44 3 sshd[16509]: Invalid user trinity from 106.52.205.81 port 36948
Sep 27 10:28:47 3 sshd[16509]: Failed password for invalid user trinity from 106.52.205.81 port 36948 ssh2
Sep 27 10:40:17 3 sshd[13917]: Invalid user labor from 106.52.205.81 port 59590
2020-09-29 05:53:53
115.159.214.200 attackspam
Sep 28 20:58:41 h2863602 sshd[15126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.214.200
Sep 28 20:58:44 h2863602 sshd[15126]: Failed password for invalid user tt from 115.159.214.200 port 60566 ssh2
...
2020-09-29 05:42:03
106.12.110.157 attack
Invalid user test from 106.12.110.157 port 46482
2020-09-29 05:51:51
193.112.126.64 attack
DATE:2020-09-28 21:53:21, IP:193.112.126.64, PORT:ssh SSH brute force auth (docker-dc)
2020-09-29 05:45:57
123.59.116.47 attackbots
$f2bV_matches
2020-09-29 05:43:48
95.85.24.147 attackbots
SSH Login Bruteforce
2020-09-29 05:39:04
95.217.234.23 attack
Invalid user ftp1 from 95.217.234.23 port 26038
2020-09-29 05:54:24
115.159.93.67 attackbots
Port Scan
...
2020-09-29 06:11:01
106.52.20.112 attackbotsspam
SSH Invalid Login
2020-09-29 05:46:15

Recently Reported IPs

197.253.199.238 197.252.220.173 197.254.41.98 197.254.16.46
197.254.126.41 197.253.124.98 197.255.131.140 197.255.134.34
197.255.141.207 197.255.125.213 197.255.207.58 197.255.41.169
197.255.50.2 197.255.225.154 197.27.205.88 197.27.94.35
197.28.137.111 197.30.152.21 197.30.221.154 197.29.3.154