Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.121.128.19 attackspambots
Bruteforce detected by fail2ban
2020-08-28 22:36:41
138.121.128.19 attackspam
SSH login attempts.
2020-08-27 04:12:52
138.121.128.19 attackspam
Aug 20 12:07:00 scw-6657dc sshd[7596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.128.19  user=root
Aug 20 12:07:00 scw-6657dc sshd[7596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.128.19  user=root
Aug 20 12:07:02 scw-6657dc sshd[7596]: Failed password for root from 138.121.128.19 port 34650 ssh2
...
2020-08-20 21:41:38
138.121.128.19 attackspam
Aug 16 11:13:11 ip106 sshd[21276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.128.19 
Aug 16 11:13:14 ip106 sshd[21276]: Failed password for invalid user els from 138.121.128.19 port 54574 ssh2
...
2020-08-16 17:40:47
138.121.128.19 attackspam
2020-08-12 23:16:34.372024-0500  localhost sshd[1565]: Failed password for root from 138.121.128.19 port 35192 ssh2
2020-08-13 18:23:37
138.121.128.19 attack
Aug  1 07:48:38 buvik sshd[7773]: Failed password for root from 138.121.128.19 port 51614 ssh2
Aug  1 07:52:14 buvik sshd[8385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.128.19  user=root
Aug  1 07:52:16 buvik sshd[8385]: Failed password for root from 138.121.128.19 port 46428 ssh2
...
2020-08-01 13:53:51
138.121.128.19 attackbots
Invalid user jira from 138.121.128.19 port 39228
2020-07-31 02:26:10
138.121.128.94 attackbotsspam
Unauthorized connection attempt detected from IP address 138.121.128.94 to port 8080
2020-07-22 20:46:44
138.121.128.19 attack
$f2bV_matches
2020-07-14 14:36:17
138.121.128.19 attackbots
Jul 12 21:56:25 meumeu sshd[487515]: Invalid user admin1 from 138.121.128.19 port 41802
Jul 12 21:56:25 meumeu sshd[487515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.128.19 
Jul 12 21:56:25 meumeu sshd[487515]: Invalid user admin1 from 138.121.128.19 port 41802
Jul 12 21:56:27 meumeu sshd[487515]: Failed password for invalid user admin1 from 138.121.128.19 port 41802 ssh2
Jul 12 21:59:54 meumeu sshd[487606]: Invalid user redmine from 138.121.128.19 port 37862
Jul 12 21:59:54 meumeu sshd[487606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.128.19 
Jul 12 21:59:54 meumeu sshd[487606]: Invalid user redmine from 138.121.128.19 port 37862
Jul 12 21:59:55 meumeu sshd[487606]: Failed password for invalid user redmine from 138.121.128.19 port 37862 ssh2
Jul 12 22:03:22 meumeu sshd[488035]: Invalid user kos from 138.121.128.19 port 33926
...
2020-07-13 04:05:02
138.121.128.19 attackspam
Jun 30 21:05:34 vps sshd[15244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.128.19 
Jun 30 21:05:36 vps sshd[15244]: Failed password for invalid user upload from 138.121.128.19 port 46862 ssh2
Jun 30 21:19:25 vps sshd[16402]: Failed password for root from 138.121.128.19 port 56782 ssh2
...
2020-07-02 02:25:39
138.121.128.19 attackbots
Jun 20 14:13:56 sip sshd[713615]: Failed password for invalid user cynthia from 138.121.128.19 port 56554 ssh2
Jun 20 14:17:52 sip sshd[713652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.128.19  user=root
Jun 20 14:17:54 sip sshd[713652]: Failed password for root from 138.121.128.19 port 56166 ssh2
...
2020-06-20 23:07:34
138.121.128.19 attackspam
frenzy
2020-06-20 14:08:36
138.121.128.20 attackbots
Icarus honeypot on github
2020-06-15 00:17:58
138.121.128.46 attack
Port Scan detected!
...
2020-05-27 06:42:30
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.121.128.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.121.128.34.			IN	A

;; AUTHORITY SECTION:
.			119	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:21:46 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 34.128.121.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.128.121.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
109.194.199.28 attack
Oct 20 03:10:50 tuotantolaitos sshd[7160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.199.28
Oct 20 03:10:51 tuotantolaitos sshd[7160]: Failed password for invalid user user from 109.194.199.28 port 7296 ssh2
...
2019-10-20 08:15:16
58.242.164.10 attackspam
Automatic report - Banned IP Access
2019-10-20 08:12:08
206.189.146.13 attack
Oct 19 22:05:42 legacy sshd[21439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.146.13
Oct 19 22:05:45 legacy sshd[21439]: Failed password for invalid user ellacat from 206.189.146.13 port 39763 ssh2
Oct 19 22:12:13 legacy sshd[21702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.146.13
...
2019-10-20 08:00:11
194.228.3.191 attack
Oct 19 13:34:03 hanapaa sshd\[689\]: Invalid user volzer from 194.228.3.191
Oct 19 13:34:03 hanapaa sshd\[689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.228.3.191
Oct 19 13:34:05 hanapaa sshd\[689\]: Failed password for invalid user volzer from 194.228.3.191 port 33491 ssh2
Oct 19 13:37:59 hanapaa sshd\[1031\]: Invalid user darla from 194.228.3.191
Oct 19 13:37:59 hanapaa sshd\[1031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.228.3.191
2019-10-20 07:47:43
220.174.209.154 attack
Automatic report - Banned IP Access
2019-10-20 08:03:50
90.190.151.34 attack
Oct 20 00:24:14 h2177944 kernel: \[4399764.201927\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=90.190.151.34 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=37793 PROTO=TCP SPT=25386 DPT=23 WINDOW=0 RES=0x00 SYN URGP=0 
Oct 20 00:27:46 h2177944 kernel: \[4399976.226493\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=90.190.151.34 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=48328 PROTO=TCP SPT=3801 DPT=23 WINDOW=0 RES=0x00 SYN URGP=0 
Oct 20 00:47:37 h2177944 kernel: \[4401167.258140\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=90.190.151.34 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=20911 PROTO=TCP SPT=50191 DPT=23 WINDOW=0 RES=0x00 SYN URGP=0 
Oct 20 00:48:41 h2177944 kernel: \[4401230.997815\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=90.190.151.34 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=42227 PROTO=TCP SPT=25609 DPT=23 WINDOW=0 RES=0x00 SYN URGP=0 
Oct 20 00:48:47 h2177944 kernel: \[4401237.032847\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=90.190.151.34 DST=85.214.117.9 LEN=40 TOS=0x00 PREC
2019-10-20 07:50:50
222.186.169.192 attackspam
SSH Brute Force, server-1 sshd[14164]: Failed password for root from 222.186.169.192 port 47644 ssh2
2019-10-20 08:10:50
185.156.73.27 attackspambots
Port scan on 15 port(s): 2989 20290 20291 26788 26789 26790 29683 29684 29685 44917 44918 44919 47633 47634 53002
2019-10-20 07:43:49
95.47.239.84 attack
Automatic report - Port Scan Attack
2019-10-20 07:37:25
49.234.217.210 attackbotsspam
Oct 18 03:14:03 penfold sshd[20606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.217.210  user=r.r
Oct 18 03:14:05 penfold sshd[20606]: Failed password for r.r from 49.234.217.210 port 47368 ssh2
Oct 18 03:14:06 penfold sshd[20606]: Received disconnect from 49.234.217.210 port 47368:11: Bye Bye [preauth]
Oct 18 03:14:06 penfold sshd[20606]: Disconnected from 49.234.217.210 port 47368 [preauth]
Oct 18 03:21:22 penfold sshd[20925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.217.210  user=r.r
Oct 18 03:21:24 penfold sshd[20925]: Failed password for r.r from 49.234.217.210 port 43482 ssh2
Oct 18 03:21:24 penfold sshd[20925]: Received disconnect from 49.234.217.210 port 43482:11: Bye Bye [preauth]
Oct 18 03:21:24 penfold sshd[20925]: Disconnected from 49.234.217.210 port 43482 [preauth]
Oct 18 03:26:01 penfold sshd[21049]: pam_unix(sshd:auth): authentication failure; lognam........
-------------------------------
2019-10-20 07:41:39
222.128.74.100 attackbotsspam
2019-10-07T10:33:53.610251homeassistant sshd[23191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.128.74.100  user=root
2019-10-07T10:33:55.687864homeassistant sshd[23191]: Failed password for root from 222.128.74.100 port 36458 ssh2
...
2019-10-20 07:52:39
113.125.55.44 attackspambots
$f2bV_matches
2019-10-20 07:37:02
106.53.90.75 attackbotsspam
6x Failed Password
2019-10-20 07:44:07
164.132.100.13 attack
MYH,DEF GET /web/wp-login.php
2019-10-20 07:54:05
141.98.81.38 attack
Oct 19 22:58:28 vpn01 sshd[7393]: Failed password for root from 141.98.81.38 port 9071 ssh2
Oct 19 22:58:28 vpn01 sshd[7395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.38
...
2019-10-20 07:35:09

Recently Reported IPs

138.121.121.248 138.121.129.120 118.174.69.206 138.121.129.126
138.121.129.132 138.121.129.141 138.121.129.128 138.121.129.138
138.121.129.144 138.121.129.143 138.121.129.135 138.121.129.177
138.121.129.184 138.121.129.165 138.121.129.170 118.174.69.212
138.121.129.186 138.121.129.193 138.121.129.188 138.121.129.20