Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Khon Kaen

Region: Khon Kaen

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.12.97.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51808
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.12.97.1.			IN	A

;; AUTHORITY SECTION:
.			467	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051200 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 12 17:49:08 CST 2023
;; MSG SIZE  rcvd: 104
Host info
1.97.12.202.in-addr.arpa domain name pointer kku1.kku.ac.th.
1.97.12.202.in-addr.arpa domain name pointer ns0.kku.ac.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.97.12.202.in-addr.arpa	name = ns0.kku.ac.th.
1.97.12.202.in-addr.arpa	name = kku1.kku.ac.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.61.104.246 attack
bruteforce detected
2020-05-16 05:19:50
195.70.59.121 attackbots
May 15 16:49:21 ny01 sshd[10049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.70.59.121
May 15 16:49:24 ny01 sshd[10049]: Failed password for invalid user test from 195.70.59.121 port 50940 ssh2
May 15 16:51:14 ny01 sshd[10309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.70.59.121
2020-05-16 04:59:03
222.186.175.217 attack
May 15 17:05:45 NPSTNNYC01T sshd[7965]: Failed password for root from 222.186.175.217 port 31706 ssh2
May 15 17:05:58 NPSTNNYC01T sshd[7965]: Failed password for root from 222.186.175.217 port 31706 ssh2
May 15 17:05:58 NPSTNNYC01T sshd[7965]: error: maximum authentication attempts exceeded for root from 222.186.175.217 port 31706 ssh2 [preauth]
...
2020-05-16 05:13:49
128.234.251.16 attackbotsspam
20/5/15@16:50:46: FAIL: Alarm-Intrusion address from=128.234.251.16
...
2020-05-16 05:21:07
103.253.42.59 attack
[2020-05-15 16:49:38] NOTICE[1157][C-000050a5] chan_sip.c: Call from '' (103.253.42.59:61227) to extension '901146462607642' rejected because extension not found in context 'public'.
[2020-05-15 16:49:38] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-15T16:49:38.085-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146462607642",SessionID="0x7f5f100266a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.253.42.59/61227",ACLName="no_extension_match"
[2020-05-15 16:50:56] NOTICE[1157][C-000050a7] chan_sip.c: Call from '' (103.253.42.59:56677) to extension '801146462607642' rejected because extension not found in context 'public'.
[2020-05-15 16:50:56] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-15T16:50:56.813-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="801146462607642",SessionID="0x7f5f107b3898",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/
...
2020-05-16 05:13:25
197.157.195.185 attack
Automatic report - Port Scan Attack
2020-05-16 04:56:26
185.200.118.47 attackspambots
scan z
2020-05-16 05:24:55
24.53.16.121 attackbots
May 15 22:51:09 santamaria sshd\[7926\]: Invalid user oracle from 24.53.16.121
May 15 22:51:09 santamaria sshd\[7926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.53.16.121
May 15 22:51:11 santamaria sshd\[7926\]: Failed password for invalid user oracle from 24.53.16.121 port 41096 ssh2
...
2020-05-16 05:00:40
123.206.111.27 attack
May 15 23:06:27 vps687878 sshd\[28812\]: Invalid user fedor from 123.206.111.27 port 56062
May 15 23:06:27 vps687878 sshd\[28812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.111.27
May 15 23:06:29 vps687878 sshd\[28812\]: Failed password for invalid user fedor from 123.206.111.27 port 56062 ssh2
May 15 23:10:22 vps687878 sshd\[29375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.111.27  user=root
May 15 23:10:25 vps687878 sshd\[29375\]: Failed password for root from 123.206.111.27 port 44754 ssh2
...
2020-05-16 05:13:10
106.13.73.210 attackspam
(sshd) Failed SSH login from 106.13.73.210 (CN/China/-): 5 in the last 3600 secs
2020-05-16 05:00:20
222.186.42.136 attackbots
odoo8
...
2020-05-16 05:06:33
138.68.107.225 attackbotsspam
May 15 17:25:45 NPSTNNYC01T sshd[10371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.107.225
May 15 17:25:46 NPSTNNYC01T sshd[10371]: Failed password for invalid user ns2c from 138.68.107.225 port 45312 ssh2
May 15 17:29:16 NPSTNNYC01T sshd[10685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.107.225
...
2020-05-16 05:33:18
190.85.92.218 attack
Brute forcing RDP port 3389
2020-05-16 05:15:18
46.32.112.237 attackspam
Automatic report - Port Scan Attack
2020-05-16 04:57:05
222.186.173.142 attackbotsspam
2020-05-15T21:20:41.718856shield sshd\[9074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
2020-05-15T21:20:43.678047shield sshd\[9074\]: Failed password for root from 222.186.173.142 port 34132 ssh2
2020-05-15T21:20:47.274538shield sshd\[9074\]: Failed password for root from 222.186.173.142 port 34132 ssh2
2020-05-15T21:20:50.094244shield sshd\[9074\]: Failed password for root from 222.186.173.142 port 34132 ssh2
2020-05-15T21:20:52.983325shield sshd\[9074\]: Failed password for root from 222.186.173.142 port 34132 ssh2
2020-05-16 05:29:52

Recently Reported IPs

140.116.221.30 45.235.142.195 140.116.135.123 140.116.74.48
140.123.213.120 140.116.223.72 140.116.198.150 137.63.135.139
161.53.212.203 140.116.239.137 140.116.43.250 144.92.12.24
140.116.111.77 119.254.252.190 193.144.47.25 140.116.98.186
200.17.209.1 140.116.88.147 120.124.204.4 131.251.254.198