Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Guatemala

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.117.142.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52756
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.117.142.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 06:52:30 CST 2025
;; MSG SIZE  rcvd: 107
Host info
12.142.117.138.in-addr.arpa domain name pointer host_117_142_12.broadcomguatemala.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.142.117.138.in-addr.arpa	name = host_117_142_12.broadcomguatemala.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
114.4.227.194 attack
Apr 19 14:56:10 sshgateway sshd\[4386\]: Invalid user oc from 114.4.227.194
Apr 19 14:56:10 sshgateway sshd\[4386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.4.227.194
Apr 19 14:56:12 sshgateway sshd\[4386\]: Failed password for invalid user oc from 114.4.227.194 port 49606 ssh2
2020-04-19 23:24:20
35.202.92.255 attackspambots
Apr 19 19:34:26 webhost01 sshd[25068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.202.92.255
Apr 19 19:34:29 webhost01 sshd[25068]: Failed password for invalid user postgres from 35.202.92.255 port 34984 ssh2
...
2020-04-19 23:26:55
94.177.225.152 attack
...
2020-04-19 23:19:22
122.51.211.131 attackbots
Apr 19 17:04:11 xeon sshd[2706]: Failed password for root from 122.51.211.131 port 54048 ssh2
2020-04-19 23:51:51
104.45.153.57 attackspambots
Apr 19 14:03:51 scw-6657dc sshd[17634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.45.153.57
Apr 19 14:03:51 scw-6657dc sshd[17634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.45.153.57
Apr 19 14:03:54 scw-6657dc sshd[17634]: Failed password for invalid user csgo from 104.45.153.57 port 58856 ssh2
...
2020-04-20 00:06:44
183.220.146.250 attack
Apr 19 12:02:18 *** sshd[12775]: User root from 183.220.146.250 not allowed because not listed in AllowUsers
2020-04-19 23:27:20
203.192.214.203 attackspam
(imapd) Failed IMAP login from 203.192.214.203 (IN/India/dhcp-192-214-203.in2cable.com): 1 in the last 3600 secs
2020-04-19 23:37:31
134.175.91.198 attackbotsspam
Apr 19 21:24:13 our-server-hostname sshd[18886]: Invalid user kw from 134.175.91.198
Apr 19 21:24:13 our-server-hostname sshd[18886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.91.198 
Apr 19 21:24:15 our-server-hostname sshd[18886]: Failed password for invalid user kw from 134.175.91.198 port 34058 ssh2
Apr 19 21:45:47 our-server-hostname sshd[24006]: Invalid user ghostname from 134.175.91.198
Apr 19 21:45:47 our-server-hostname sshd[24006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.91.198 
Apr 19 21:45:50 our-server-hostname sshd[24006]: Failed password for invalid user ghostname from 134.175.91.198 port 48734 ssh2
Apr 19 21:51:53 our-server-hostname sshd[25562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.91.198  user=r.r
Apr 19 21:51:55 our-server-hostname sshd[25562]: Failed password for r.r from 134.175.91.1........
-------------------------------
2020-04-19 23:26:20
51.104.246.27 attack
Apr 19 13:51:37 server sshd[3429]: Failed password for invalid user wq from 51.104.246.27 port 60806 ssh2
Apr 19 13:57:43 server sshd[4926]: Failed password for invalid user admin from 51.104.246.27 port 58454 ssh2
Apr 19 14:01:58 server sshd[5824]: Failed password for invalid user hi from 51.104.246.27 port 50258 ssh2
2020-04-19 23:59:26
134.175.191.248 attackspambots
Apr 19 19:10:01 itv-usvr-01 sshd[22933]: Invalid user ro from 134.175.191.248
Apr 19 19:10:01 itv-usvr-01 sshd[22933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.191.248
Apr 19 19:10:01 itv-usvr-01 sshd[22933]: Invalid user ro from 134.175.191.248
Apr 19 19:10:04 itv-usvr-01 sshd[22933]: Failed password for invalid user ro from 134.175.191.248 port 52466 ssh2
Apr 19 19:14:39 itv-usvr-01 sshd[23162]: Invalid user jz from 134.175.191.248
2020-04-19 23:41:29
145.102.6.49 attack
Port scan on 1 port(s): 53
2020-04-19 23:38:00
94.102.56.181 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 90 - port: 9528 proto: TCP cat: Misc Attack
2020-04-19 23:31:03
213.21.53.2 attackspambots
Apr 19 16:24:15  sshd\[29909\]: User root from 213.21.53.2 not allowed because not listed in AllowUsersApr 19 16:24:17  sshd\[29909\]: Failed password for invalid user root from 213.21.53.2 port 55688 ssh2
...
2020-04-19 23:44:52
49.146.46.86 attackbotsspam
Unauthorized connection attempt from IP address 49.146.46.86 on Port 445(SMB)
2020-04-20 00:05:01
171.229.174.121 attackspambots
Unauthorized connection attempt from IP address 171.229.174.121 on Port 445(SMB)
2020-04-20 00:06:16

Recently Reported IPs

196.22.197.234 171.179.194.23 197.198.135.70 93.93.106.54
18.115.223.174 155.217.153.44 135.125.33.14 189.72.117.102
187.184.135.51 94.209.240.251 19.8.140.98 135.160.245.38
69.48.176.19 91.139.162.136 217.194.74.67 130.47.253.240
209.109.212.12 225.84.30.57 236.188.132.150 3.156.124.19