Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.14.196.167
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33808
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.14.196.167.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021000 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 14:27:58 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 167.196.14.57.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 167.196.14.57.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.150.220.234 attackbotsspam
Nov  1 21:15:46 MK-Soft-Root2 sshd[20633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.150.220.234 
Nov  1 21:15:48 MK-Soft-Root2 sshd[20633]: Failed password for invalid user mortega from 218.150.220.234 port 46614 ssh2
...
2019-11-02 04:37:12
181.49.117.166 attack
Nov  1 21:14:49 sso sshd[4334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.117.166
Nov  1 21:14:52 sso sshd[4334]: Failed password for invalid user mdom from 181.49.117.166 port 56800 ssh2
...
2019-11-02 04:53:01
80.211.240.4 attack
11/01/2019-21:15:45.782259 80.211.240.4 Protocol: 17 ET SCAN Sipvicious Scan
2019-11-02 04:44:26
65.75.93.36 attack
Nov  1 21:04:45 herz-der-gamer sshd[10954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.75.93.36  user=root
Nov  1 21:04:47 herz-der-gamer sshd[10954]: Failed password for root from 65.75.93.36 port 17053 ssh2
Nov  1 21:16:12 herz-der-gamer sshd[11178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.75.93.36  user=root
Nov  1 21:16:14 herz-der-gamer sshd[11178]: Failed password for root from 65.75.93.36 port 21715 ssh2
...
2019-11-02 04:30:06
191.8.96.99 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/191.8.96.99/ 
 
 EU - 1H : (6)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : EU 
 NAME ASN : ASN27699 
 
 IP : 191.8.96.99 
 
 CIDR : 191.8.0.0/17 
 
 PREFIX COUNT : 267 
 
 UNIQUE IP COUNT : 6569728 
 
 
 ATTACKS DETECTED ASN27699 :  
  1H - 8 
  3H - 20 
  6H - 42 
 12H - 89 
 24H - 173 
 
 DateTime : 2019-11-01 21:15:18 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-02 04:54:34
113.59.74.55 attack
Nov  1 21:14:53 xeon sshd[27876]: Failed password for invalid user adda from 113.59.74.55 port 55566 ssh2
2019-11-02 04:21:16
123.21.179.103 attack
Nov  1 21:15:47 mail sshd\[30733\]: Invalid user admin from 123.21.179.103
Nov  1 21:15:47 mail sshd\[30733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.21.179.103
Nov  1 21:15:49 mail sshd\[30733\]: Failed password for invalid user admin from 123.21.179.103 port 36882 ssh2
...
2019-11-02 04:34:26
101.95.190.166 attackbotsspam
Unauthorized connection attempt from IP address 101.95.190.166 on Port 445(SMB)
2019-11-02 04:43:28
189.102.142.235 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/189.102.142.235/ 
 
 AU - 1H : (39)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AU 
 NAME ASN : ASN28573 
 
 IP : 189.102.142.235 
 
 CIDR : 189.102.0.0/16 
 
 PREFIX COUNT : 1254 
 
 UNIQUE IP COUNT : 9653760 
 
 
 ATTACKS DETECTED ASN28573 :  
  1H - 1 
  3H - 4 
  6H - 9 
 12H - 18 
 24H - 29 
 
 DateTime : 2019-11-01 21:15:34 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-02 04:54:54
114.7.120.10 attackbotsspam
Nov  1 21:15:55 bouncer sshd\[13839\]: Invalid user admin from 114.7.120.10 port 38135
Nov  1 21:15:55 bouncer sshd\[13839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.7.120.10 
Nov  1 21:15:57 bouncer sshd\[13839\]: Failed password for invalid user admin from 114.7.120.10 port 38135 ssh2
...
2019-11-02 04:25:25
190.36.12.194 attackbotsspam
Unauthorized connection attempt from IP address 190.36.12.194 on Port 445(SMB)
2019-11-02 04:49:41
81.22.45.251 attackbots
Nov  1 21:37:55 mc1 kernel: \[3926990.936829\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.251 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=39971 PROTO=TCP SPT=57274 DPT=4358 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  1 21:41:44 mc1 kernel: \[3927219.121830\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.251 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=42120 PROTO=TCP SPT=57274 DPT=4421 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  1 21:43:07 mc1 kernel: \[3927302.646903\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.251 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=62423 PROTO=TCP SPT=57274 DPT=4592 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-02 04:43:58
202.29.56.202 attackbots
Automatic report - SSH Brute-Force Attack
2019-11-02 04:31:54
61.141.64.64 attackbotsspam
1433/tcp
[2019-11-01]1pkt
2019-11-02 04:31:12
122.129.107.18 attackbotsspam
Unauthorized connection attempt from IP address 122.129.107.18 on Port 445(SMB)
2019-11-02 04:24:40

Recently Reported IPs

4.169.92.124 223.187.119.11 138.193.122.57 149.228.93.160
49.245.22.223 33.104.7.145 54.173.151.15 208.3.86.136
15.13.114.165 72.180.234.27 35.111.41.158 176.157.9.23
163.20.64.166 92.82.179.87 70.120.77.1 124.210.141.172
219.165.40.249 194.165.121.115 231.6.184.228 69.104.41.187