Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.108.21.174
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14084
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.108.21.174.			IN	A

;; AUTHORITY SECTION:
.			295	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 19:02:00 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 174.21.108.138.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 174.21.108.138.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
188.255.132.31 attack
Sep 30 23:38:41 master sshd[7310]: Failed password for invalid user admin from 188.255.132.31 port 51090 ssh2
Sep 30 23:38:45 master sshd[7312]: Failed password for invalid user admin from 188.255.132.31 port 51094 ssh2
2020-10-01 13:20:54
38.68.50.195 attack
Port scan: Attack repeated for 24 hours
2020-10-01 13:44:27
14.186.251.19 attackspam
20/9/30@16:40:49: FAIL: Alarm-Network address from=14.186.251.19
...
2020-10-01 13:41:04
192.241.217.161 attackspambots
Oct  1 07:17:44 vm1 sshd[5429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.217.161
Oct  1 07:17:46 vm1 sshd[5429]: Failed password for invalid user marie from 192.241.217.161 port 35802 ssh2
...
2020-10-01 13:44:46
192.241.208.139 attack
IP 192.241.208.139 attacked honeypot on port: 992 at 9/30/2020 7:36:47 PM
2020-10-01 13:34:46
49.234.122.94 attack
Invalid user oracle from 49.234.122.94 port 41238
2020-10-01 13:33:53
104.131.126.10 attackspambots
Invalid user pierre from 104.131.126.10 port 40330
2020-10-01 13:43:08
119.45.30.53 attackspambots
Invalid user user from 119.45.30.53 port 52422
2020-10-01 13:42:47
103.103.130.245 attack
20 attempts against mh-ssh on air
2020-10-01 13:33:04
220.186.170.90 attackbots
20 attempts against mh-ssh on shade
2020-10-01 13:17:19
141.98.9.32 attack
Sep 30 18:59:54 wbs sshd\[32663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.32  user=root
Sep 30 18:59:56 wbs sshd\[32663\]: Failed password for root from 141.98.9.32 port 36429 ssh2
Sep 30 19:00:19 wbs sshd\[32718\]: Invalid user guest from 141.98.9.32
Sep 30 19:00:19 wbs sshd\[32718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.32
Sep 30 19:00:21 wbs sshd\[32718\]: Failed password for invalid user guest from 141.98.9.32 port 41525 ssh2
2020-10-01 13:19:07
162.243.10.64 attack
Invalid user consul from 162.243.10.64 port 57046
2020-10-01 13:46:47
49.233.47.104 attackspambots
Total attacks: 2
2020-10-01 13:55:28
129.152.141.71 attackbots
Oct  1 07:01:29 server sshd[42917]: Failed password for invalid user minecraft from 129.152.141.71 port 40983 ssh2
Oct  1 07:05:25 server sshd[43827]: Failed password for invalid user nelson from 129.152.141.71 port 15238 ssh2
Oct  1 07:09:30 server sshd[44747]: Failed password for root from 129.152.141.71 port 45995 ssh2
2020-10-01 13:32:26
49.234.105.96 attackbotsspam
$f2bV_matches
2020-10-01 13:56:54

Recently Reported IPs

114.105.220.135 114.105.220.138 114.105.220.143 114.105.220.15
116.209.53.140 116.209.53.154 116.209.53.142 116.209.53.153
116.209.53.156 116.209.53.158 116.209.53.15 116.209.53.144
116.209.53.145 116.209.53.150 114.105.220.151 116.209.53.146
116.209.53.148 116.209.53.16 116.209.53.162 116.209.53.164