Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Reserved

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.138.214.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18358
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;10.138.214.84.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070800 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 08 22:53:25 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 84.214.138.10.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 84.214.138.10.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.42.175.200 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-02-27 03:22:56
209.97.184.211 attack
$f2bV_matches
2020-02-27 03:31:09
41.41.195.164 attack
suspicious action Wed, 26 Feb 2020 10:34:33 -0300
2020-02-27 03:46:06
210.177.54.141 attackbotsspam
$f2bV_matches
2020-02-27 03:24:44
178.20.231.114 attackbotsspam
suspicious action Wed, 26 Feb 2020 10:35:02 -0300
2020-02-27 03:13:49
158.69.223.91 attackbots
Feb 26 09:10:32 tdfoods sshd\[8320\]: Invalid user nx from 158.69.223.91
Feb 26 09:10:32 tdfoods sshd\[8320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.ip-158-69-223.net
Feb 26 09:10:34 tdfoods sshd\[8320\]: Failed password for invalid user nx from 158.69.223.91 port 60223 ssh2
Feb 26 09:20:15 tdfoods sshd\[9188\]: Invalid user mother from 158.69.223.91
Feb 26 09:20:15 tdfoods sshd\[9188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.ip-158-69-223.net
2020-02-27 03:22:32
209.97.165.144 attackbotsspam
$f2bV_matches
2020-02-27 03:34:33
187.188.185.162 attackbotsspam
SMTP-SASL bruteforce attempt
2020-02-27 03:13:31
122.100.231.116 attackbots
Automatic report - Port Scan Attack
2020-02-27 03:37:32
210.186.144.81 attackbots
$f2bV_matches
2020-02-27 03:23:30
168.151.229.13 attackspambots
WP Exploit wp-login.php?action=register
2020-02-27 03:31:43
182.200.37.80 attack
Feb 26 18:54:55 vpn01 sshd[31283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.200.37.80
Feb 26 18:54:57 vpn01 sshd[31283]: Failed password for invalid user www from 182.200.37.80 port 13703 ssh2
...
2020-02-27 03:35:17
210.212.194.6 attackspambots
$f2bV_matches
2020-02-27 03:10:07
210.211.116.204 attack
$f2bV_matches
2020-02-27 03:11:26
210.212.237.67 attackbotsspam
$f2bV_matches
2020-02-27 03:07:51

Recently Reported IPs

49.35.247.132 228.245.177.70 46.251.196.92 36.83.13.214
217.170.255.29 45.13.36.15 171.6.247.151 45.123.8.126
103.253.153.84 34.74.191.199 65.51.36.192 1.54.195.165
42.188.157.244 176.57.133.197 41.79.17.76 123.190.6.98
5.189.227.111 157.245.144.229 170.254.72.10 118.220.199.178