Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.118.140.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10076
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.118.140.214.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 19:05:52 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 214.140.118.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.140.118.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
69.112.124.104 attackspambots
Sep 20 20:02:13 root sshd[6841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ool-45707c68.dyn.optonline.net  user=root
Sep 20 20:02:15 root sshd[6841]: Failed password for root from 69.112.124.104 port 53888 ssh2
...
2020-09-21 13:53:47
168.70.124.50 attackspambots
Sep 20 19:00:11 scw-focused-cartwright sshd[25222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.70.124.50
Sep 20 19:00:12 scw-focused-cartwright sshd[25222]: Failed password for invalid user pi from 168.70.124.50 port 38525 ssh2
2020-09-21 14:03:48
139.198.120.226 attack
Sep 21 02:28:58 www sshd[11471]: Invalid user cloud from 139.198.120.226
Sep 21 02:28:58 www sshd[11471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.120.226 
Sep 21 02:29:00 www sshd[11471]: Failed password for invalid user cloud from 139.198.120.226 port 36580 ssh2
Sep 21 02:29:01 www sshd[11471]: Received disconnect from 139.198.120.226: 11: Bye Bye [preauth]
Sep 21 02:33:40 www sshd[11539]: Invalid user user from 139.198.120.226
Sep 21 02:33:40 www sshd[11539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.120.226 
Sep 21 02:33:43 www sshd[11539]: Failed password for invalid user user from 139.198.120.226 port 59698 ssh2
Sep 21 02:33:44 www sshd[11539]: Received disconnect from 139.198.120.226: 11: Bye Bye [preauth]
Sep 21 02:36:38 www sshd[11557]: Invalid user ftpuser from 139.198.120.226
Sep 21 02:36:38 www sshd[11557]: pam_unix(sshd:auth): authentication failure;........
-------------------------------
2020-09-21 13:42:36
160.124.103.55 attackbots
$f2bV_matches
2020-09-21 13:58:27
136.143.156.93 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-09-21 14:08:38
183.104.137.225 attack
Sep 20 20:02:15 root sshd[6867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.104.137.225  user=root
Sep 20 20:02:18 root sshd[6867]: Failed password for root from 183.104.137.225 port 55190 ssh2
...
2020-09-21 13:49:58
167.114.185.237 attackbotsspam
Sep 21 02:37:42 scw-6657dc sshd[22970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.185.237  user=root
Sep 21 02:37:42 scw-6657dc sshd[22970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.185.237  user=root
Sep 21 02:37:44 scw-6657dc sshd[22970]: Failed password for root from 167.114.185.237 port 44582 ssh2
...
2020-09-21 13:37:29
119.45.141.115 attackbots
Sep 21 07:33:54 abendstille sshd\[14085\]: Invalid user user from 119.45.141.115
Sep 21 07:33:54 abendstille sshd\[14085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.141.115
Sep 21 07:33:56 abendstille sshd\[14085\]: Failed password for invalid user user from 119.45.141.115 port 40848 ssh2
Sep 21 07:39:38 abendstille sshd\[19897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.141.115  user=root
Sep 21 07:39:40 abendstille sshd\[19897\]: Failed password for root from 119.45.141.115 port 46128 ssh2
...
2020-09-21 13:59:17
182.114.202.46 attackspambots
Tried our host z.
2020-09-21 13:45:00
167.172.56.36 attack
167.172.56.36 - - [21/Sep/2020:05:55:44 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.172.56.36 - - [21/Sep/2020:05:55:45 +0200] "POST /wp-login.php HTTP/1.1" 200 9047 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.172.56.36 - - [21/Sep/2020:05:55:45 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-21 14:04:47
27.194.134.214 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-09-21 13:39:15
81.12.52.130 attack
20/9/20@18:10:22: FAIL: Alarm-Intrusion address from=81.12.52.130
...
2020-09-21 14:12:06
124.236.22.12 attackspam
4 SSH login attempts.
2020-09-21 14:12:38
186.91.193.113 attackbots
Sep 20 20:02:19 root sshd[6908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186-91-193-113.genericrev.cantv.net  user=root
Sep 20 20:02:21 root sshd[6908]: Failed password for root from 186.91.193.113 port 35560 ssh2
...
2020-09-21 13:48:32
27.147.186.123 attackspam
Sep 20 20:02:29 root sshd[7032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.147.186.123  user=root
Sep 20 20:02:30 root sshd[7032]: Failed password for root from 27.147.186.123 port 60205 ssh2
...
2020-09-21 13:40:13

Recently Reported IPs

51.109.80.172 83.88.211.122 57.222.73.171 88.52.16.60
128.72.208.155 239.215.144.158 166.43.110.195 195.157.228.51
177.170.8.198 214.48.158.84 94.246.98.239 195.44.105.64
122.101.210.233 98.75.166.138 28.54.52.198 147.76.3.9
194.202.119.243 165.82.116.246 175.112.149.137 193.38.228.250