Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Argentina

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.117.114.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58259
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.117.114.222.		IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:35:11 CST 2022
;; MSG SIZE  rcvd: 108
Host info
222.114.117.138.in-addr.arpa domain name pointer dynamic-138-117-114-222.cotel.com.ar.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
222.114.117.138.in-addr.arpa	name = dynamic-138-117-114-222.cotel.com.ar.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
199.195.252.213 attackbotsspam
2020-01-26T08:38:46.975851abusebot-3.cloudsearch.cf sshd[18490]: Invalid user docs from 199.195.252.213 port 50172
2020-01-26T08:38:46.990756abusebot-3.cloudsearch.cf sshd[18490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213
2020-01-26T08:38:46.975851abusebot-3.cloudsearch.cf sshd[18490]: Invalid user docs from 199.195.252.213 port 50172
2020-01-26T08:38:49.071593abusebot-3.cloudsearch.cf sshd[18490]: Failed password for invalid user docs from 199.195.252.213 port 50172 ssh2
2020-01-26T08:40:29.877749abusebot-3.cloudsearch.cf sshd[18581]: Invalid user telekom from 199.195.252.213 port 39684
2020-01-26T08:40:29.884341abusebot-3.cloudsearch.cf sshd[18581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213
2020-01-26T08:40:29.877749abusebot-3.cloudsearch.cf sshd[18581]: Invalid user telekom from 199.195.252.213 port 39684
2020-01-26T08:40:32.437089abusebot-3.cloudsearch.cf sshd
...
2020-01-26 16:41:19
83.211.162.82 attack
Unauthorized connection attempt detected from IP address 83.211.162.82 to port 2220 [J]
2020-01-26 16:39:22
181.188.166.82 attackspambots
Automatic report - XMLRPC Attack
2020-01-26 17:02:41
89.248.162.136 attackspam
Port 4596 scan denied
2020-01-26 16:44:58
125.39.73.101 attack
SSH invalid-user multiple login attempts
2020-01-26 16:50:00
148.70.159.5 attack
Jan 26 09:08:52 MainVPS sshd[12425]: Invalid user ftptest from 148.70.159.5 port 57900
Jan 26 09:08:52 MainVPS sshd[12425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.159.5
Jan 26 09:08:52 MainVPS sshd[12425]: Invalid user ftptest from 148.70.159.5 port 57900
Jan 26 09:08:54 MainVPS sshd[12425]: Failed password for invalid user ftptest from 148.70.159.5 port 57900 ssh2
Jan 26 09:12:47 MainVPS sshd[20216]: Invalid user gz from 148.70.159.5 port 59504
...
2020-01-26 16:25:39
58.214.255.41 attackspam
Jan 25 22:33:08 php1 sshd\[14858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.214.255.41  user=root
Jan 25 22:33:11 php1 sshd\[14858\]: Failed password for root from 58.214.255.41 port 44404 ssh2
Jan 25 22:37:01 php1 sshd\[15282\]: Invalid user foo from 58.214.255.41
Jan 25 22:37:01 php1 sshd\[15282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.214.255.41
Jan 25 22:37:02 php1 sshd\[15282\]: Failed password for invalid user foo from 58.214.255.41 port 63587 ssh2
2020-01-26 16:51:07
119.206.5.25 attackspambots
Unauthorized connection attempt detected from IP address 119.206.5.25 to port 4873 [J]
2020-01-26 17:04:34
129.204.50.75 attackspambots
2020-01-26T00:56:11.071849xentho-1 sshd[811933]: Invalid user jupyter from 129.204.50.75 port 32944
2020-01-26T00:56:11.081628xentho-1 sshd[811933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.50.75
2020-01-26T00:56:11.071849xentho-1 sshd[811933]: Invalid user jupyter from 129.204.50.75 port 32944
2020-01-26T00:56:12.638521xentho-1 sshd[811933]: Failed password for invalid user jupyter from 129.204.50.75 port 32944 ssh2
2020-01-26T00:57:29.947759xentho-1 sshd[811958]: Invalid user gts from 129.204.50.75 port 42414
2020-01-26T00:57:29.955529xentho-1 sshd[811958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.50.75
2020-01-26T00:57:29.947759xentho-1 sshd[811958]: Invalid user gts from 129.204.50.75 port 42414
2020-01-26T00:57:31.888388xentho-1 sshd[811958]: Failed password for invalid user gts from 129.204.50.75 port 42414 ssh2
2020-01-26T00:58:44.481639xentho-1 sshd[811976]: Invalid use
...
2020-01-26 16:33:46
198.98.60.164 attack
Lines containing failures of 198.98.60.164
Jan 23 13:57:28 sanyalnet-cloud-vps sshd[8547]: Connection from 198.98.60.164 port 54488 on 104.167.106.93 port 22
Jan 23 13:57:28 sanyalnet-cloud-vps sshd[8547]: Invalid user support from 198.98.60.164 port 54488
Jan 23 13:57:28 sanyalnet-cloud-vps sshd[8547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.60.164
Jan 23 13:57:31 sanyalnet-cloud-vps sshd[8547]: Failed password for invalid user support from 198.98.60.164 port 54488 ssh2
Jan 23 13:57:31 sanyalnet-cloud-vps sshd[8547]: Connection reset by 198.98.60.164 port 54488 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=198.98.60.164
2020-01-26 16:58:34
42.189.233.42 attack
Jan 26 05:48:06 debian-2gb-nbg1-2 kernel: \[2273359.115648\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=42.189.233.42 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=54 ID=55649 PROTO=TCP SPT=25983 DPT=37215 WINDOW=18519 RES=0x00 SYN URGP=0
2020-01-26 16:57:15
218.92.0.179 attackbotsspam
Jan 26 09:21:58 * sshd[5673]: Failed password for root from 218.92.0.179 port 14863 ssh2
Jan 26 09:22:12 * sshd[5673]: error: maximum authentication attempts exceeded for root from 218.92.0.179 port 14863 ssh2 [preauth]
2020-01-26 16:29:29
41.63.0.133 attackbots
Unauthorized connection attempt detected from IP address 41.63.0.133 to port 2220 [J]
2020-01-26 16:57:31
122.51.207.46 attack
Jan 25 22:40:13 eddieflores sshd\[16011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.207.46  user=root
Jan 25 22:40:15 eddieflores sshd\[16011\]: Failed password for root from 122.51.207.46 port 35014 ssh2
Jan 25 22:44:11 eddieflores sshd\[16446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.207.46  user=root
Jan 25 22:44:13 eddieflores sshd\[16446\]: Failed password for root from 122.51.207.46 port 32926 ssh2
Jan 25 22:48:06 eddieflores sshd\[16938\]: Invalid user redmine from 122.51.207.46
Jan 25 22:48:06 eddieflores sshd\[16938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.207.46
2020-01-26 17:04:09
213.59.144.39 attackbotsspam
Unauthorized connection attempt detected from IP address 213.59.144.39 to port 2220 [J]
2020-01-26 16:52:19

Recently Reported IPs

138.117.112.134 138.117.115.23 138.118.234.175 138.118.102.26
138.117.91.93 138.118.234.241 138.118.102.27 138.118.226.1
138.118.234.4 138.118.234.32 138.118.234.167 138.118.234.37
138.121.41.63 138.118.234.85 138.121.138.193 138.121.237.229
138.121.50.21 138.122.154.172 138.118.243.46 138.118.81.110