Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.97.42.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39947
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.97.42.239.			IN	A

;; AUTHORITY SECTION:
.			537	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 22:47:11 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 239.42.97.197.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.42.97.197.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.134.179.57 attackspam
Jul  8 04:35:53 debian-2gb-nbg1-2 kernel: \[16434353.735647\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.134.179.57 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=14146 PROTO=TCP SPT=50493 DPT=323 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-08 10:45:36
190.143.205.69 attackspam
(smtpauth) Failed SMTP AUTH login from 190.143.205.69 (GT/Guatemala/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-08 00:38:31 plain authenticator failed for ([190.143.205.69]) [190.143.205.69]: 535 Incorrect authentication data (set_id=info@hadafisf.ir)
2020-07-08 10:47:53
45.229.91.71 attack
RDP brute force attack detected by fail2ban
2020-07-08 10:53:08
37.139.1.197 attackspam
leo_www
2020-07-08 11:03:31
164.132.56.243 attackspambots
Jul  7 21:37:47 rocket sshd[6396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.243
Jul  7 21:37:49 rocket sshd[6396]: Failed password for invalid user benign from 164.132.56.243 port 59412 ssh2
...
2020-07-08 10:53:51
191.97.5.71 attackspambots
(eximsyntax) Exim syntax errors from 191.97.5.71 (CO/Colombia/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-08 00:38:42 SMTP call from [191.97.5.71] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f?	?")
2020-07-08 10:38:49
122.155.17.174 attackspam
Jul  8 01:07:59 sip sshd[29883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.17.174
Jul  8 01:08:00 sip sshd[29883]: Failed password for invalid user plarson from 122.155.17.174 port 33708 ssh2
Jul  8 01:23:33 sip sshd[3275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.17.174
2020-07-08 10:43:31
111.231.135.232 attackbots
Jul  7 23:52:11 host sshd[30647]: Invalid user motooka from 111.231.135.232 port 49560
...
2020-07-08 11:06:49
2001:41d0:a:29ce:: attackspambots
2001:41d0:a:29ce:: - - [08/Jul/2020:02:32:27 +0100] "POST /wp-login.php HTTP/1.1" 200 2413 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2001:41d0:a:29ce:: - - [08/Jul/2020:02:32:28 +0100] "POST /wp-login.php HTTP/1.1" 200 2397 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2001:41d0:a:29ce:: - - [08/Jul/2020:02:32:28 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-08 10:29:15
159.65.155.229 attackbotsspam
$f2bV_matches
2020-07-08 10:47:10
196.15.211.91 attackbotsspam
Jul  8 04:07:38 zulu412 sshd\[25073\]: Invalid user office2 from 196.15.211.91 port 35072
Jul  8 04:07:38 zulu412 sshd\[25073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.15.211.91
Jul  8 04:07:40 zulu412 sshd\[25073\]: Failed password for invalid user office2 from 196.15.211.91 port 35072 ssh2
...
2020-07-08 10:34:15
213.6.77.34 attack
From CCTV User Interface Log
...::ffff:213.6.77.34 - - [07/Jul/2020:16:08:44 +0000] "GET / HTTP/1.1" 200 960
...
2020-07-08 10:40:36
154.117.154.86 attackbotsspam
Jul  8 04:15:02 rancher-0 sshd[183482]: Invalid user test from 154.117.154.86 port 44865
...
2020-07-08 10:37:39
49.235.28.96 attack
20 attempts against mh-ssh on pluto
2020-07-08 10:38:17
101.231.146.34 attackbotsspam
2020-07-08T03:06:00.2218831240 sshd\[18781\]: Invalid user keaton from 101.231.146.34 port 51062
2020-07-08T03:06:00.2285491240 sshd\[18781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.146.34
2020-07-08T03:06:02.8497781240 sshd\[18781\]: Failed password for invalid user keaton from 101.231.146.34 port 51062 ssh2
...
2020-07-08 10:35:35

Recently Reported IPs

197.97.191.164 197.98.16.26 197.98.44.137 197.97.42.208
122.125.214.51 198.1.101.217 198.1.106.191 198.1.111.123
198.1.114.212 198.1.111.173 198.1.115.148 198.1.119.187
198.1.119.198 198.1.65.120 198.1.122.41 198.1.28.215
198.1.119.218 198.1.72.5 198.1.65.216 198.1.26.67