Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.101.104.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60552
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.101.104.31.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 23:45:36 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 31.104.101.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 31.104.101.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
196.216.245.5 attackspam
Lines containing failures of 196.216.245.5
Jul 19 13:06:53 shared07 sshd[29670]: Invalid user andrea from 196.216.245.5 port 35716
Jul 19 13:06:53 shared07 sshd[29670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.216.245.5
Jul 19 13:06:55 shared07 sshd[29670]: Failed password for invalid user andrea from 196.216.245.5 port 35716 ssh2
Jul 19 13:06:55 shared07 sshd[29670]: Received disconnect from 196.216.245.5 port 35716:11: Bye Bye [preauth]
Jul 19 13:06:55 shared07 sshd[29670]: Disconnected from invalid user andrea 196.216.245.5 port 35716 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=196.216.245.5
2020-07-19 21:32:59
114.35.11.86 attackspam
Port probing on unauthorized port 88
2020-07-19 21:36:43
60.167.176.212 attackbots
Jul 19 09:45:15 ovpn sshd\[20042\]: Invalid user Test from 60.167.176.212
Jul 19 09:45:15 ovpn sshd\[20042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.176.212
Jul 19 09:45:17 ovpn sshd\[20042\]: Failed password for invalid user Test from 60.167.176.212 port 60268 ssh2
Jul 19 10:01:35 ovpn sshd\[23958\]: Invalid user apache from 60.167.176.212
Jul 19 10:01:35 ovpn sshd\[23958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.176.212
2020-07-19 20:57:25
165.22.49.42 attack
Jul 19 14:48:05 mellenthin sshd[20214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.49.42
Jul 19 14:48:07 mellenthin sshd[20214]: Failed password for invalid user can from 165.22.49.42 port 44640 ssh2
2020-07-19 21:10:57
77.95.103.42 attack
Unauthorized connection attempt detected from IP address 77.95.103.42 to port 3389 [T]
2020-07-19 21:37:49
182.16.110.190 attackbots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-19T10:33:17Z and 2020-07-19T10:43:26Z
2020-07-19 21:16:40
188.210.187.179 attackbotsspam
20/7/19@04:10:14: FAIL: Alarm-Network address from=188.210.187.179
...
2020-07-19 21:01:09
52.188.71.151 attackspam
Unauthorized connection attempt detected from IP address 52.188.71.151 to port 80
2020-07-19 21:11:31
152.168.137.2 attackbots
$f2bV_matches
2020-07-19 21:31:49
68.183.169.251 attack
Jul 19 03:51:32 dignus sshd[16853]: Failed password for invalid user test123 from 68.183.169.251 port 60840 ssh2
Jul 19 03:55:26 dignus sshd[17311]: Invalid user admin from 68.183.169.251 port 42964
Jul 19 03:55:26 dignus sshd[17311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.169.251
Jul 19 03:55:28 dignus sshd[17311]: Failed password for invalid user admin from 68.183.169.251 port 42964 ssh2
Jul 19 03:59:24 dignus sshd[17917]: Invalid user joaquim from 68.183.169.251 port 53330
...
2020-07-19 20:59:07
190.144.79.157 attackspam
$f2bV_matches
2020-07-19 21:34:12
37.255.174.205 attackbotsspam
DATE:2020-07-19 09:49:21, IP:37.255.174.205, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-07-19 21:24:55
59.72.122.148 attack
Invalid user april from 59.72.122.148 port 44410
2020-07-19 21:15:49
66.68.187.145 attack
Fail2Ban - SSH Bruteforce Attempt
2020-07-19 21:24:26
176.67.80.9 attackspambots
[2020-07-19 09:17:05] NOTICE[1277] chan_sip.c: Registration from '' failed for '176.67.80.9:59216' - Wrong password
[2020-07-19 09:17:05] SECURITY[1295] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-19T09:17:05.048-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="8353",SessionID="0x7f1754188e58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/176.67.80.9/59216",Challenge="4107885b",ReceivedChallenge="4107885b",ReceivedHash="b57c443aebc42427293647c2caaca8ed"
[2020-07-19 09:17:46] NOTICE[1277] chan_sip.c: Registration from '' failed for '176.67.80.9:57440' - Wrong password
[2020-07-19 09:17:46] SECURITY[1295] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-19T09:17:46.307-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="7036",SessionID="0x7f1754188e58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/176.67.80.9/57440",
...
2020-07-19 21:36:12

Recently Reported IPs

89.204.83.205 22.103.56.127 104.0.132.21 200.11.41.240
186.139.187.218 54.37.105.32 215.76.214.227 204.106.16.92
148.178.26.125 243.106.120.106 117.152.97.165 78.200.57.241
72.175.52.155 92.95.209.130 2.150.19.190 128.150.108.232
250.158.243.201 107.195.255.232 215.221.241.89 202.251.167.27