Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.83.108.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.83.108.136.			IN	A

;; AUTHORITY SECTION:
.			198	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023101800 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 19 01:19:28 CST 2023
;; MSG SIZE  rcvd: 107
Host info
136.108.83.197.in-addr.arpa domain name pointer 197-83-108-136.dyn.mweb.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.108.83.197.in-addr.arpa	name = 197-83-108-136.dyn.mweb.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.128.158.37 attack
2020-06-28T16:13:15.8419131495-001 sshd[16360]: Invalid user dia from 124.128.158.37 port 10638
2020-06-28T16:13:17.8280711495-001 sshd[16360]: Failed password for invalid user dia from 124.128.158.37 port 10638 ssh2
2020-06-28T16:16:39.3243131495-001 sshd[16457]: Invalid user sdi from 124.128.158.37 port 10639
2020-06-28T16:16:39.3313791495-001 sshd[16457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.128.158.37
2020-06-28T16:16:39.3243131495-001 sshd[16457]: Invalid user sdi from 124.128.158.37 port 10639
2020-06-28T16:16:41.6534811495-001 sshd[16457]: Failed password for invalid user sdi from 124.128.158.37 port 10639 ssh2
...
2020-06-29 07:26:57
212.92.122.106 attackspambots
RDPBruteCAu
2020-06-29 07:46:10
111.229.31.144 attack
Unauthorized connection attempt detected from IP address 111.229.31.144 to port 6885
2020-06-29 07:29:35
112.213.126.26 attackbotsspam
20/6/28@16:35:58: FAIL: Alarm-Network address from=112.213.126.26
20/6/28@16:35:58: FAIL: Alarm-Network address from=112.213.126.26
...
2020-06-29 07:39:12
202.75.221.99 attack
1433/tcp 1433/tcp 1433/tcp...
[2020-06-11/28]4pkt,1pt.(tcp)
2020-06-29 07:40:42
106.13.150.200 attack
Jun 28 22:48:06 onepixel sshd[1372562]: Invalid user bar from 106.13.150.200 port 41296
Jun 28 22:48:06 onepixel sshd[1372562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.150.200 
Jun 28 22:48:06 onepixel sshd[1372562]: Invalid user bar from 106.13.150.200 port 41296
Jun 28 22:48:07 onepixel sshd[1372562]: Failed password for invalid user bar from 106.13.150.200 port 41296 ssh2
Jun 28 22:51:39 onepixel sshd[1374397]: Invalid user mona from 106.13.150.200 port 59940
2020-06-29 07:10:02
54.37.154.113 attackbotsspam
Jun 28 22:11:04 game-panel sshd[15117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.154.113
Jun 28 22:11:06 game-panel sshd[15117]: Failed password for invalid user cb from 54.37.154.113 port 55690 ssh2
Jun 28 22:14:19 game-panel sshd[15335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.154.113
2020-06-29 07:10:20
14.232.207.112 attack
20/6/28@16:35:58: FAIL: Alarm-Network address from=14.232.207.112
20/6/28@16:35:59: FAIL: Alarm-Network address from=14.232.207.112
...
2020-06-29 07:41:12
206.189.44.246 attackspambots
2020-06-28T23:26:33.209095shield sshd\[3912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.44.246  user=root
2020-06-28T23:26:35.066869shield sshd\[3912\]: Failed password for root from 206.189.44.246 port 55694 ssh2
2020-06-28T23:27:41.950437shield sshd\[4215\]: Invalid user admin from 206.189.44.246 port 43404
2020-06-28T23:27:41.955759shield sshd\[4215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.44.246
2020-06-28T23:27:44.476860shield sshd\[4215\]: Failed password for invalid user admin from 206.189.44.246 port 43404 ssh2
2020-06-29 07:32:18
107.140.5.137 attack
2020-06-28T22:36:00.213135mail.broermann.family sshd[26733]: Failed password for root from 107.140.5.137 port 59312 ssh2
2020-06-28T22:36:01.584212mail.broermann.family sshd[26738]: Invalid user admin from 107.140.5.137 port 59358
2020-06-28T22:36:01.737964mail.broermann.family sshd[26738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107-140-5-137.lightspeed.irvnca.sbcglobal.net
2020-06-28T22:36:01.584212mail.broermann.family sshd[26738]: Invalid user admin from 107.140.5.137 port 59358
2020-06-28T22:36:03.583990mail.broermann.family sshd[26738]: Failed password for invalid user admin from 107.140.5.137 port 59358 ssh2
...
2020-06-29 07:34:14
13.78.232.229 attackbotsspam
Jun 24 20:22:41 uapps sshd[22465]: Failed password for invalid user admin from 13.78.232.229 port 1088 ssh2
Jun 24 20:22:41 uapps sshd[22467]: Failed password for invalid user admin from 13.78.232.229 port 1088 ssh2
Jun 24 20:22:41 uapps sshd[22465]: Received disconnect from 13.78.232.229: 11: Client disconnecting normally [preauth]
Jun 24 20:22:41 uapps sshd[22467]: Received disconnect from 13.78.232.229: 11: Client disconnecting normally [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=13.78.232.229
2020-06-29 07:13:56
186.7.80.130 attack
186.7.80.130 - - [28/Jun/2020:21:18:50 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
186.7.80.130 - - [28/Jun/2020:21:29:47 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
186.7.80.130 - - [28/Jun/2020:21:36:03 +0100] "POST /wp-login.php HTTP/1.1" 200 7828 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-06-29 07:32:57
140.143.211.45 attack
Jun 28 22:36:06 host sshd[32648]: Invalid user carlos from 140.143.211.45 port 33810
...
2020-06-29 07:31:21
125.94.149.231 attackbotsspam
445/tcp 1433/tcp...
[2020-06-11/28]5pkt,2pt.(tcp)
2020-06-29 07:46:55
170.106.38.190 attack
Jun 28 16:09:09 Tower sshd[19443]: refused connect from 167.71.109.97 (167.71.109.97)
Jun 28 19:35:46 Tower sshd[19443]: Connection from 170.106.38.190 port 48756 on 192.168.10.220 port 22 rdomain ""
Jun 28 19:35:46 Tower sshd[19443]: Invalid user odd from 170.106.38.190 port 48756
Jun 28 19:35:46 Tower sshd[19443]: error: Could not get shadow information for NOUSER
Jun 28 19:35:46 Tower sshd[19443]: Failed password for invalid user odd from 170.106.38.190 port 48756 ssh2
Jun 28 19:35:46 Tower sshd[19443]: Received disconnect from 170.106.38.190 port 48756:11: Bye Bye [preauth]
Jun 28 19:35:46 Tower sshd[19443]: Disconnected from invalid user odd 170.106.38.190 port 48756 [preauth]
2020-06-29 07:45:26

Recently Reported IPs

231.83.213.150 56.175.214.200 130.66.119.169 132.199.195.170
174.96.88.152 203.17.63.123 116.19.65.54 64.231.99.125
160.14.33.143 111.64.172.5 18.168.197.125 151.34.186.165
166.96.8.9 254.8.192.129 126.221.106.3 26.178.8.33
224.0.172.179 183.146.204.4 239.123.65.24 80.169.245.46