Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.196.134.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17300
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.196.134.116.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024113000 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 30 20:40:15 CST 2024
;; MSG SIZE  rcvd: 108
Host info
Host 116.134.196.198.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 116.134.196.198.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
68.183.64.176 attack
68.183.64.176 - - [14/Aug/2020:04:58:39 +0100] "POST /wp-login.php HTTP/1.1" 200 2070 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.64.176 - - [14/Aug/2020:04:58:50 +0100] "POST /wp-login.php HTTP/1.1" 200 2116 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.64.176 - - [14/Aug/2020:04:59:01 +0100] "POST /wp-login.php HTTP/1.1" 200 2086 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-14 12:07:21
162.214.14.226 attackspambots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-08-14 12:23:53
82.200.174.6 attack
Port Scan/VNC login attempt
...
2020-08-14 08:47:41
212.83.172.78 attack
212.83.172.78 - - [14/Aug/2020:05:12:45 +0100] "POST /wp-login.php HTTP/1.1" 200 1802 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.83.172.78 - - [14/Aug/2020:05:12:46 +0100] "POST /wp-login.php HTTP/1.1" 200 1780 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.83.172.78 - - [14/Aug/2020:05:12:46 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-14 12:13:04
203.151.146.216 attackbots
SSH Brute Force
2020-08-14 12:20:20
222.186.173.183 attackspambots
web-1 [ssh] SSH Attack
2020-08-14 12:11:44
142.93.215.22 attackspam
Aug 14 05:53:35 nextcloud sshd\[27464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.215.22  user=root
Aug 14 05:53:37 nextcloud sshd\[27464\]: Failed password for root from 142.93.215.22 port 57954 ssh2
Aug 14 05:58:06 nextcloud sshd\[31894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.215.22  user=root
2020-08-14 12:24:44
49.88.112.112 attack
Aug 14 05:59:00 mout sshd[26357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.112  user=root
Aug 14 05:59:02 mout sshd[26357]: Failed password for root from 49.88.112.112 port 11445 ssh2
Aug 14 05:59:06 mout sshd[26357]: Failed password for root from 49.88.112.112 port 11445 ssh2
Aug 14 05:59:08 mout sshd[26357]: Failed password for root from 49.88.112.112 port 11445 ssh2
2020-08-14 12:08:51
120.188.81.218 attackspam
1597377063 - 08/14/2020 05:51:03 Host: 120.188.81.218/120.188.81.218 Port: 445 TCP Blocked
2020-08-14 12:04:37
92.255.248.230 attackspam
Dovecot Invalid User Login Attempt.
2020-08-14 12:16:35
60.50.99.134 attackspambots
2020-08-14T04:26:27.490596hostname sshd[6162]: Failed password for root from 60.50.99.134 port 38008 ssh2
2020-08-14T04:30:11.379924hostname sshd[7692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.99.50.60.klj03-home.tm.net.my  user=root
2020-08-14T04:30:13.298578hostname sshd[7692]: Failed password for root from 60.50.99.134 port 33882 ssh2
...
2020-08-14 08:48:10
139.155.146.60 attack
Aug 13 20:42:12 *** sshd[3985]: User root from 139.155.146.60 not allowed because not listed in AllowUsers
2020-08-14 08:39:00
83.48.89.147 attackspambots
Aug 13 17:53:40 web9 sshd\[11682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.48.89.147  user=root
Aug 13 17:53:41 web9 sshd\[11682\]: Failed password for root from 83.48.89.147 port 39489 ssh2
Aug 13 17:58:04 web9 sshd\[12345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.48.89.147  user=root
Aug 13 17:58:06 web9 sshd\[12345\]: Failed password for root from 83.48.89.147 port 47483 ssh2
Aug 13 18:02:03 web9 sshd\[12875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.48.89.147  user=root
2020-08-14 12:06:42
159.203.102.122 attackspambots
 TCP (SYN) 159.203.102.122:58584 -> port 7935, len 44
2020-08-14 08:46:12
186.4.242.37 attackspambots
Aug 14 01:09:21 rancher-0 sshd[1072498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.242.37  user=root
Aug 14 01:09:22 rancher-0 sshd[1072498]: Failed password for root from 186.4.242.37 port 41078 ssh2
...
2020-08-14 08:41:53

Recently Reported IPs

146.65.178.227 136.229.107.15 2.222.211.117 40.133.250.172
210.34.182.124 171.180.210.209 163.149.9.83 40.199.163.235
134.188.100.65 111.150.190.228 111.150.190.248 4.74.83.84
43.84.100.101 128.11.245.223 237.121.31.14 136.15.201.95
232.93.133.0 114.19.71.17 4.97.240.171 198.73.121.187