Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.128.114.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.128.114.104.		IN	A

;; AUTHORITY SECTION:
.			491	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:25:50 CST 2022
;; MSG SIZE  rcvd: 108
Host info
104.114.128.138.in-addr.arpa domain name pointer e50b9.zethasknorsea.info.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.114.128.138.in-addr.arpa	name = e50b9.zethasknorsea.info.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.194.201.16 attackbots
Aug 13 08:56:20 journals sshd\[57900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.194.201.16  user=root
Aug 13 08:56:22 journals sshd\[57900\]: Failed password for root from 112.194.201.16 port 56074 ssh2
Aug 13 09:00:07 journals sshd\[58290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.194.201.16  user=root
Aug 13 09:00:08 journals sshd\[58290\]: Failed password for root from 112.194.201.16 port 45594 ssh2
Aug 13 09:04:04 journals sshd\[58642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.194.201.16  user=root
...
2020-08-13 18:24:04
129.82.138.44 attack
srv02 Mass scanning activity detected Target: -  ..
2020-08-13 18:46:19
2.61.187.69 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-13 18:35:19
112.49.38.4 attack
Aug 13 05:47:42 ns3164893 sshd[14162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.49.38.4  user=root
Aug 13 05:47:44 ns3164893 sshd[14162]: Failed password for root from 112.49.38.4 port 48464 ssh2
...
2020-08-13 19:00:13
138.94.0.97 attack
Brute force attempt
2020-08-13 19:01:56
45.136.7.165 attackbotsspam
2020-08-12 22:44:03.313664-0500  localhost smtpd[19658]: NOQUEUE: reject: RCPT from unknown[45.136.7.165]: 554 5.7.1 Service unavailable; Client host [45.136.7.165] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2020-08-13 18:24:29
222.186.175.154 attackbots
Hit honeypot r.
2020-08-13 18:41:18
64.227.62.250 attackbotsspam
"Unauthorized connection attempt on SSHD detected"
2020-08-13 18:36:08
106.55.167.58 attackbotsspam
$f2bV_matches
2020-08-13 18:44:39
218.92.0.185 attackspam
Aug 13 12:50:36 db sshd[11564]: User root from 218.92.0.185 not allowed because none of user's groups are listed in AllowGroups
...
2020-08-13 18:58:57
5.196.225.174 attackbotsspam
sshd: Failed password for .... from 5.196.225.174 port 60060 ssh2 (11 attempts)
2020-08-13 18:28:59
180.153.57.251 attackbots
Port scan denied
2020-08-13 19:01:31
191.240.119.101 attackbotsspam
Brute force attempt
2020-08-13 18:43:38
178.32.105.63 attack
Aug 13 11:30:13 rocket sshd[10045]: Failed password for root from 178.32.105.63 port 44292 ssh2
Aug 13 11:37:34 rocket sshd[10981]: Failed password for root from 178.32.105.63 port 39856 ssh2
...
2020-08-13 18:39:13
14.98.213.14 attack
Aug 13 06:30:39 scw-tender-jepsen sshd[2458]: Failed password for root from 14.98.213.14 port 34886 ssh2
2020-08-13 18:33:44

Recently Reported IPs

138.128.114.101 138.128.114.110 138.128.114.106 138.128.114.113
138.128.114.111 138.128.114.122 118.174.93.6 138.128.114.116
138.128.114.120 138.128.114.138 138.128.114.141 138.128.114.127
138.128.114.130 138.128.114.146 138.128.114.145 138.128.114.152
118.174.93.79 138.128.114.154 138.128.114.158 138.128.114.159