Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Barueri

Region: Sao Paulo

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.0.97.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10257
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.0.97.162.			IN	A

;; AUTHORITY SECTION:
.			214	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101501 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 16 03:15:09 CST 2019
;; MSG SIZE  rcvd: 116
Host info
162.97.0.138.in-addr.arpa domain name pointer 138-0-97-162.megaconexao.inf.br.
Nslookup info:
162.97.0.138.in-addr.arpa	name = 138-0-97-162.megaconexao.inf.br.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
106.12.20.3 attackspam
Aug  4 21:58:42 lukav-desktop sshd\[11348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.20.3  user=root
Aug  4 21:58:44 lukav-desktop sshd\[11348\]: Failed password for root from 106.12.20.3 port 34590 ssh2
Aug  4 22:02:43 lukav-desktop sshd\[11387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.20.3  user=root
Aug  4 22:02:45 lukav-desktop sshd\[11387\]: Failed password for root from 106.12.20.3 port 34932 ssh2
Aug  4 22:06:57 lukav-desktop sshd\[24210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.20.3  user=root
2020-08-05 05:03:27
62.234.59.145 attackbotsspam
Aug  4 22:37:29 ns382633 sshd\[32165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.59.145  user=root
Aug  4 22:37:31 ns382633 sshd\[32165\]: Failed password for root from 62.234.59.145 port 60236 ssh2
Aug  4 22:40:34 ns382633 sshd\[549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.59.145  user=root
Aug  4 22:40:36 ns382633 sshd\[549\]: Failed password for root from 62.234.59.145 port 34160 ssh2
Aug  4 22:43:31 ns382633 sshd\[852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.59.145  user=root
2020-08-05 04:59:26
222.186.173.154 attack
Failed password for invalid user from 222.186.173.154 port 38612 ssh2
2020-08-05 05:01:06
138.204.26.133 attack
Aug  3 14:23:20 cumulus sshd[4234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.26.133  user=r.r
Aug  3 14:23:21 cumulus sshd[4234]: Failed password for r.r from 138.204.26.133 port 2907 ssh2
Aug  3 14:23:21 cumulus sshd[4234]: Received disconnect from 138.204.26.133 port 2907:11: Bye Bye [preauth]
Aug  3 14:23:21 cumulus sshd[4234]: Disconnected from 138.204.26.133 port 2907 [preauth]
Aug  3 14:45:58 cumulus sshd[6296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.26.133  user=r.r
Aug  3 14:46:01 cumulus sshd[6296]: Failed password for r.r from 138.204.26.133 port 2843 ssh2
Aug  3 14:46:01 cumulus sshd[6296]: Received disconnect from 138.204.26.133 port 2843:11: Bye Bye [preauth]
Aug  3 14:46:01 cumulus sshd[6296]: Disconnected from 138.204.26.133 port 2843 [preauth]
Aug  3 14:59:42 cumulus sshd[7593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0........
-------------------------------
2020-08-05 05:12:26
185.234.219.13 attack
2020-08-04T13:36:33.638550linuxbox-skyline auth[73797]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=scan rhost=185.234.219.13
...
2020-08-05 04:45:10
106.12.197.165 attack
Aug  4 22:40:04 ip40 sshd[7844]: Failed password for root from 106.12.197.165 port 36592 ssh2
...
2020-08-05 04:56:02
71.6.232.7 attackbotsspam
Probable attack : HTTPS hit by IP; not hostname
2020-08-05 05:13:29
51.75.121.252 attack
Failed password for root from 51.75.121.252 port 46358 ssh2
2020-08-05 05:10:59
106.13.56.204 attackspambots
Aug  4 21:06:12 santamaria sshd\[764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.56.204  user=root
Aug  4 21:06:14 santamaria sshd\[764\]: Failed password for root from 106.13.56.204 port 50248 ssh2
Aug  4 21:09:51 santamaria sshd\[853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.56.204  user=root
...
2020-08-05 04:50:57
168.232.198.218 attackbots
SSH bruteforce
2020-08-05 04:39:48
222.186.175.169 attack
Aug  4 22:38:48 minden010 sshd[21293]: Failed password for root from 222.186.175.169 port 64968 ssh2
Aug  4 22:38:52 minden010 sshd[21293]: Failed password for root from 222.186.175.169 port 64968 ssh2
Aug  4 22:38:55 minden010 sshd[21293]: Failed password for root from 222.186.175.169 port 64968 ssh2
Aug  4 22:38:59 minden010 sshd[21293]: Failed password for root from 222.186.175.169 port 64968 ssh2
...
2020-08-05 04:44:37
222.186.175.182 attackspambots
Aug  4 22:51:25 minden010 sshd[25754]: Failed password for root from 222.186.175.182 port 5106 ssh2
Aug  4 22:51:28 minden010 sshd[25754]: Failed password for root from 222.186.175.182 port 5106 ssh2
Aug  4 22:51:32 minden010 sshd[25754]: Failed password for root from 222.186.175.182 port 5106 ssh2
Aug  4 22:51:35 minden010 sshd[25754]: Failed password for root from 222.186.175.182 port 5106 ssh2
...
2020-08-05 04:54:26
119.33.33.148 attackspambots
E-Mail Spam (RBL) [REJECTED]
2020-08-05 05:00:18
132.232.172.159 attackspambots
$f2bV_matches
2020-08-05 05:02:55
193.112.163.159 attackspambots
Aug  4 19:41:53 vm1 sshd[14440]: Failed password for root from 193.112.163.159 port 58932 ssh2
...
2020-08-05 04:54:48

Recently Reported IPs

90.140.234.28 174.0.17.21 46.185.140.22 156.198.48.230
160.39.43.53 45.252.104.89 179.69.37.207 45.141.84.30
102.82.141.106 197.125.39.60 181.84.202.227 45.252.70.105
56.65.63.85 34.193.235.175 41.32.223.87 91.55.140.108
27.8.69.86 51.37.138.24 56.88.218.18 223.190.29.237