Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.220.136.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39025
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.220.136.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011400 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 14 13:49:30 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 1.136.220.198.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 198.220.136.1.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
36.153.0.229 attackspam
Feb 15 14:00:32 lnxmysql61 sshd[9658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.153.0.229
2020-02-15 21:33:04
36.89.136.194 attack
Unauthorized connection attempt detected from IP address 36.89.136.194 to port 445
2020-02-15 21:46:30
120.76.123.100 attackbots
02/15/2020-05:45:53.053254 120.76.123.100 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-15 21:35:21
111.241.93.181 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 21:17:16
103.58.144.15 attackspambots
Invalid user jet from 103.58.144.15 port 41936
2020-02-15 21:25:52
212.64.16.31 attack
Feb  6 00:37:13 ms-srv sshd[43150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.16.31
Feb  6 00:37:14 ms-srv sshd[43150]: Failed password for invalid user thb from 212.64.16.31 port 48714 ssh2
2020-02-15 21:59:16
220.191.208.204 attackspambots
Feb 15 09:33:36 serwer sshd\[20563\]: Invalid user bsb from 220.191.208.204 port 48268
Feb 15 09:33:36 serwer sshd\[20563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.191.208.204
Feb 15 09:33:38 serwer sshd\[20563\]: Failed password for invalid user bsb from 220.191.208.204 port 48268 ssh2
...
2020-02-15 21:46:59
41.193.122.77 attack
Invalid user pi from 41.193.122.77 port 38170
2020-02-15 21:37:32
120.70.100.54 attackbots
Feb 15 05:46:26 amit sshd\[24781\]: Invalid user tom from 120.70.100.54
Feb 15 05:46:26 amit sshd\[24781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.100.54
Feb 15 05:46:28 amit sshd\[24781\]: Failed password for invalid user tom from 120.70.100.54 port 55845 ssh2
...
2020-02-15 21:30:52
45.55.206.241 attack
Feb 15 09:31:08 MK-Soft-Root2 sshd[3207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.206.241 
Feb 15 09:31:11 MK-Soft-Root2 sshd[3207]: Failed password for invalid user rustserver from 45.55.206.241 port 42786 ssh2
...
2020-02-15 21:41:55
186.201.12.10 attack
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-02-15 21:13:02
106.52.24.215 attackspambots
Automatic report - Banned IP Access
2020-02-15 21:35:46
114.67.93.108 attackbots
Feb 15 08:30:28 plex sshd[8366]: Invalid user 123 from 114.67.93.108 port 49186
2020-02-15 21:24:45
14.169.94.86 attackbotsspam
1581741931 - 02/15/2020 05:45:31 Host: 14.169.94.86/14.169.94.86 Port: 445 TCP Blocked
2020-02-15 21:48:56
58.20.129.76 attackbots
Feb 15 14:51:19 sd-53420 sshd\[28636\]: Invalid user rohr from 58.20.129.76
Feb 15 14:51:19 sd-53420 sshd\[28636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.20.129.76
Feb 15 14:51:22 sd-53420 sshd\[28636\]: Failed password for invalid user rohr from 58.20.129.76 port 49303 ssh2
Feb 15 14:54:07 sd-53420 sshd\[28838\]: Invalid user zhouh from 58.20.129.76
Feb 15 14:54:07 sd-53420 sshd\[28838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.20.129.76
...
2020-02-15 22:02:53

Recently Reported IPs

204.246.177.207 64.74.180.120 23.49.136.26 70.200.149.116
166.163.151.194 66.151.132.60 253.21.70.15 21.29.45.120
149.158.126.180 152.196.215.108 51.24.227.5 59.13.31.143
74.144.249.191 29.236.172.239 226.243.237.43 98.67.92.50
53.71.227.179 61.38.238.87 174.243.150.235 84.25.106.212