Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.198.138.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51788
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.198.138.152.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 13:36:02 CST 2025
;; MSG SIZE  rcvd: 108
Host info
152.138.198.109.in-addr.arpa domain name pointer 6dc68a98.rev.dansknet.dk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
152.138.198.109.in-addr.arpa	name = 6dc68a98.rev.dansknet.dk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.241.238.174 attackspambots
Brute force attack stopped by firewall
2020-04-05 09:34:31
106.12.220.84 attackbots
2020-04-05 01:12:25,747 fail2ban.actions: WARNING [ssh] Ban 106.12.220.84
2020-04-05 09:50:44
85.236.25.18 attack
Brute force attack stopped by firewall
2020-04-05 09:47:59
162.243.132.128 attackbotsspam
" "
2020-04-05 09:52:07
192.241.238.169 attackspam
Brute force attack stopped by firewall
2020-04-05 09:36:54
134.209.148.107 attackspam
$f2bV_matches
2020-04-05 09:32:50
185.175.93.18 attackbotsspam
Apr  5 03:13:09 debian-2gb-nbg1-2 kernel: \[8308222.128683\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.18 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=4597 PROTO=TCP SPT=45525 DPT=23788 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-05 09:25:01
43.226.69.237 attackbots
Apr  5 00:47:28 xeon sshd[28586]: Failed password for root from 43.226.69.237 port 59326 ssh2
2020-04-05 09:44:39
133.130.89.210 attack
Apr  5 00:43:31 xeon sshd[28040]: Failed password for root from 133.130.89.210 port 47568 ssh2
2020-04-05 09:46:13
37.57.12.231 attackbots
Brute force attack stopped by firewall
2020-04-05 09:58:54
192.241.238.60 attackspambots
Brute force attack stopped by firewall
2020-04-05 09:37:30
222.184.101.98 attackbots
sshd jail - ssh hack attempt
2020-04-05 10:03:03
201.236.182.92 attackbots
(sshd) Failed SSH login from 201.236.182.92 (CL/Chile/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  5 03:14:41 amsweb01 sshd[12948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.236.182.92  user=root
Apr  5 03:14:43 amsweb01 sshd[12948]: Failed password for root from 201.236.182.92 port 58826 ssh2
Apr  5 03:17:46 amsweb01 sshd[13359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.236.182.92  user=root
Apr  5 03:17:48 amsweb01 sshd[13359]: Failed password for root from 201.236.182.92 port 40360 ssh2
Apr  5 03:19:57 amsweb01 sshd[14734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.236.182.92  user=root
2020-04-05 09:33:31
91.233.250.106 attackspam
Brute force attack stopped by firewall
2020-04-05 10:06:04
46.38.145.6 attack
Apr  5 03:39:24 srv01 postfix/smtpd\[7260\]: warning: unknown\[46.38.145.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  5 03:40:37 srv01 postfix/smtpd\[7260\]: warning: unknown\[46.38.145.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  5 03:41:51 srv01 postfix/smtpd\[7260\]: warning: unknown\[46.38.145.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  5 03:43:03 srv01 postfix/smtpd\[7260\]: warning: unknown\[46.38.145.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  5 03:44:16 srv01 postfix/smtpd\[7260\]: warning: unknown\[46.38.145.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-05 09:48:31

Recently Reported IPs

162.39.225.209 186.205.145.39 135.2.244.195 155.148.238.131
216.163.217.126 15.101.253.98 69.233.157.246 95.254.25.161
247.46.191.201 59.1.155.129 133.107.134.224 163.248.218.169
239.27.112.87 45.133.241.187 166.98.124.113 168.97.150.26
84.120.237.101 113.96.27.205 19.121.127.193 130.146.176.76