Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.196.138.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10208
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;3.196.138.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 04:49:50 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 14.138.196.3.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.138.196.3.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.190.2 attackspam
Jun  2 22:36:29 vps sshd[747561]: Failed password for root from 222.186.190.2 port 19276 ssh2
Jun  2 22:36:32 vps sshd[747561]: Failed password for root from 222.186.190.2 port 19276 ssh2
Jun  2 22:36:35 vps sshd[747561]: Failed password for root from 222.186.190.2 port 19276 ssh2
Jun  2 22:36:38 vps sshd[747561]: Failed password for root from 222.186.190.2 port 19276 ssh2
Jun  2 22:36:42 vps sshd[747561]: Failed password for root from 222.186.190.2 port 19276 ssh2
...
2020-06-03 04:47:23
183.160.212.173 attack
Jun  2 22:28:52 icecube postfix/smtpd[64084]: NOQUEUE: reject: RCPT from unknown[183.160.212.173]: 554 5.7.1 Service unavailable; Client host [183.160.212.173] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/183.160.212.173 / https://www.spamhaus.org/sbl/query/SBL467953; from= to= proto=ESMTP helo=
2020-06-03 04:38:17
138.121.120.91 attack
Jun  2 22:24:46 vpn01 sshd[13646]: Failed password for root from 138.121.120.91 port 52442 ssh2
...
2020-06-03 04:46:20
194.152.206.93 attackbotsspam
2020-06-02T23:25:47.888301lavrinenko.info sshd[18358]: Failed password for root from 194.152.206.93 port 38888 ssh2
2020-06-02T23:27:22.813937lavrinenko.info sshd[18413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.93  user=root
2020-06-02T23:27:24.813703lavrinenko.info sshd[18413]: Failed password for root from 194.152.206.93 port 45596 ssh2
2020-06-02T23:28:56.718015lavrinenko.info sshd[18433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.93  user=root
2020-06-02T23:28:58.622446lavrinenko.info sshd[18433]: Failed password for root from 194.152.206.93 port 52303 ssh2
...
2020-06-03 04:35:44
106.12.27.213 attackspambots
Jun  2 22:09:15 vps687878 sshd\[22168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.213  user=root
Jun  2 22:09:17 vps687878 sshd\[22168\]: Failed password for root from 106.12.27.213 port 49182 ssh2
Jun  2 22:12:58 vps687878 sshd\[22553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.213  user=root
Jun  2 22:13:00 vps687878 sshd\[22553\]: Failed password for root from 106.12.27.213 port 46164 ssh2
Jun  2 22:16:36 vps687878 sshd\[22915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.213  user=root
...
2020-06-03 04:28:25
222.186.175.163 attackbots
Jun  2 17:28:53 firewall sshd[12815]: Failed password for root from 222.186.175.163 port 7094 ssh2
Jun  2 17:28:56 firewall sshd[12815]: Failed password for root from 222.186.175.163 port 7094 ssh2
Jun  2 17:29:00 firewall sshd[12815]: Failed password for root from 222.186.175.163 port 7094 ssh2
...
2020-06-03 04:35:14
58.213.198.74 attack
Jun  2 22:24:41 sip sshd[512331]: Failed password for root from 58.213.198.74 port 7676 ssh2
Jun  2 22:28:24 sip sshd[512397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.198.74  user=root
Jun  2 22:28:26 sip sshd[512397]: Failed password for root from 58.213.198.74 port 7677 ssh2
...
2020-06-03 04:55:32
95.111.241.224 attack
xmlrpc attack
2020-06-03 04:58:54
81.96.26.53 attackspambots
2020-06-02T20:28:31.751425+00:00 [f2b-wordpress-hard] : Authentication attempt user [munged] from 81.96.26.53
2020-06-02T20:22:25.467641+00:00 [f2b-wordpress-hard] : Authentication attempt user [munged] from 81.96.26.53
2020-06-02T20:20:43.265893+00:00 [f2b-wordpress-hard] : Authentication attempt user [munged] from 81.96.26.53
2020-06-02T19:51:10.999636+00:00 [f2b-wordpress-hard] : Authentication attempt user [munged] from 81.96.26.53
2020-06-02T19:49:07.118906+00:00 [f2b-wordpress-hard] : Authentication attempt user [munged] from 81.96.26.53
2020-06-03 04:51:31
114.67.69.200 attackbots
Jun  3 03:27:32 webhost01 sshd[20946]: Failed password for root from 114.67.69.200 port 38568 ssh2
...
2020-06-03 04:34:15
106.12.89.184 attackbots
2020-06-02T22:30:06.152964mail.broermann.family sshd[25943]: Failed password for root from 106.12.89.184 port 33880 ssh2
2020-06-02T22:32:38.924288mail.broermann.family sshd[26186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.184  user=root
2020-06-02T22:32:40.637620mail.broermann.family sshd[26186]: Failed password for root from 106.12.89.184 port 40774 ssh2
2020-06-02T22:35:05.802919mail.broermann.family sshd[26403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.184  user=root
2020-06-02T22:35:07.697355mail.broermann.family sshd[26403]: Failed password for root from 106.12.89.184 port 47662 ssh2
...
2020-06-03 04:45:43
222.112.220.12 attackbots
Jun  2 22:28:29 ns3164893 sshd[32706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.112.220.12  user=root
Jun  2 22:28:31 ns3164893 sshd[32706]: Failed password for root from 222.112.220.12 port 41795 ssh2
...
2020-06-03 04:52:15
222.186.30.112 attack
Jun  2 22:32:21 vmi345603 sshd[6531]: Failed password for root from 222.186.30.112 port 13246 ssh2
...
2020-06-03 04:34:00
192.99.116.132 attack
Jun  2 22:22:06 localhost sshd\[19341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.116.132  user=root
Jun  2 22:22:08 localhost sshd\[19341\]: Failed password for root from 192.99.116.132 port 55086 ssh2
Jun  2 22:25:19 localhost sshd\[19629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.116.132  user=root
Jun  2 22:25:21 localhost sshd\[19629\]: Failed password for root from 192.99.116.132 port 60218 ssh2
Jun  2 22:28:42 localhost sshd\[19730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.116.132  user=root
...
2020-06-03 04:44:32
1.203.115.141 attack
Jun  2 20:28:17 scw-6657dc sshd[25835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.115.141  user=root
Jun  2 20:28:17 scw-6657dc sshd[25835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.115.141  user=root
Jun  2 20:28:19 scw-6657dc sshd[25835]: Failed password for root from 1.203.115.141 port 43464 ssh2
...
2020-06-03 04:59:12

Recently Reported IPs

251.110.197.228 119.23.58.132 25.107.195.217 129.211.229.174
191.161.252.43 126.217.156.147 77.44.211.60 22.38.105.124
78.140.98.129 67.253.29.15 184.166.112.121 163.121.92.185
103.240.212.140 40.56.229.98 39.53.91.124 160.8.167.169
227.65.187.76 76.222.17.74 137.56.191.178 64.22.134.128