Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.165.46.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19275
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.165.46.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 21:54:42 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 212.46.165.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 212.46.165.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.189.197 attack
Aug  1 06:02:30 gospond sshd[3575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.189.197  user=root
Aug  1 06:02:33 gospond sshd[3575]: Failed password for root from 106.12.189.197 port 36388 ssh2
...
2020-08-01 15:16:45
200.122.249.203 attackspam
Aug  1 07:23:10 abendstille sshd\[10315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.122.249.203  user=root
Aug  1 07:23:12 abendstille sshd\[10315\]: Failed password for root from 200.122.249.203 port 43234 ssh2
Aug  1 07:26:21 abendstille sshd\[13729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.122.249.203  user=root
Aug  1 07:26:23 abendstille sshd\[13729\]: Failed password for root from 200.122.249.203 port 38375 ssh2
Aug  1 07:29:46 abendstille sshd\[16896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.122.249.203  user=root
...
2020-08-01 14:50:24
218.92.0.221 attackspambots
2020-08-01T10:17:53.396578lavrinenko.info sshd[16438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.221  user=root
2020-08-01T10:17:55.369162lavrinenko.info sshd[16438]: Failed password for root from 218.92.0.221 port 40552 ssh2
2020-08-01T10:17:53.396578lavrinenko.info sshd[16438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.221  user=root
2020-08-01T10:17:55.369162lavrinenko.info sshd[16438]: Failed password for root from 218.92.0.221 port 40552 ssh2
2020-08-01T10:17:57.189793lavrinenko.info sshd[16438]: Failed password for root from 218.92.0.221 port 40552 ssh2
...
2020-08-01 15:25:22
51.91.212.81 attackbotsspam
Unauthorized connection attempt detected from IP address 51.91.212.81 to port 9998
2020-08-01 14:59:49
5.9.155.226 attack
20 attempts against mh-misbehave-ban on twig
2020-08-01 15:22:57
112.85.42.189 attackbotsspam
2020-08-01T03:15:38.650782uwu-server sshd[833292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189  user=root
2020-08-01T03:15:40.758004uwu-server sshd[833292]: Failed password for root from 112.85.42.189 port 52231 ssh2
2020-08-01T03:15:38.650782uwu-server sshd[833292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189  user=root
2020-08-01T03:15:40.758004uwu-server sshd[833292]: Failed password for root from 112.85.42.189 port 52231 ssh2
2020-08-01T03:15:44.243013uwu-server sshd[833292]: Failed password for root from 112.85.42.189 port 52231 ssh2
...
2020-08-01 15:21:11
34.236.5.220 attackspambots
Aug  1 08:20:12 eventyay sshd[7041]: Failed password for root from 34.236.5.220 port 39022 ssh2
Aug  1 08:23:39 eventyay sshd[7124]: Failed password for root from 34.236.5.220 port 43802 ssh2
...
2020-08-01 14:49:16
97.81.1.178 attackbotsspam
Fail2Ban Ban Triggered
2020-08-01 14:56:23
132.232.132.103 attackbotsspam
Aug  1 07:41:24 vps1 sshd[29254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.132.103  user=root
Aug  1 07:41:26 vps1 sshd[29254]: Failed password for invalid user root from 132.232.132.103 port 57480 ssh2
Aug  1 07:43:32 vps1 sshd[29311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.132.103  user=root
Aug  1 07:43:34 vps1 sshd[29311]: Failed password for invalid user root from 132.232.132.103 port 49732 ssh2
Aug  1 07:45:38 vps1 sshd[29364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.132.103  user=root
Aug  1 07:45:40 vps1 sshd[29364]: Failed password for invalid user root from 132.232.132.103 port 41984 ssh2
...
2020-08-01 15:06:55
175.24.9.251 attack
Invalid user qzb from 175.24.9.251 port 48270
2020-08-01 15:20:29
221.163.31.174 attackspam
Aug  1 11:53:14 bacztwo sshd[13141]: Invalid user ubnt from 221.163.31.174 port 48707
Aug  1 11:53:15 bacztwo sshd[13361]: Invalid user support from 221.163.31.174 port 48791
Aug  1 11:53:15 bacztwo sshd[13630]: Invalid user netscreen from 221.163.31.174 port 48851
Aug  1 11:53:16 bacztwo sshd[13914]: Invalid user osboxes from 221.163.31.174 port 48943
Aug  1 11:53:17 bacztwo sshd[14159]: Invalid user openhabian from 221.163.31.174 port 49010
Aug  1 11:53:18 bacztwo sshd[14529]: Invalid user NetLinx from 221.163.31.174 port 49136
Aug  1 11:53:18 bacztwo sshd[14763]: Invalid user nexthink from 221.163.31.174 port 49206
Aug  1 11:53:19 bacztwo sshd[14942]: Invalid user misp from 221.163.31.174 port 49281
Aug  1 11:53:46 bacztwo sshd[21761]: Invalid user admin from 221.163.31.174 port 52487
Aug  1 11:53:46 bacztwo sshd[21992]: Invalid user admin from 221.163.31.174 port 52554
Aug  1 11:53:47 bacztwo sshd[22270]: Invalid user admin from 221.163.31.174 port 52610
Aug  1 11:53:48 bacztwo ssh
...
2020-08-01 15:18:50
123.108.35.186 attack
Aug  1 07:06:59 vps-51d81928 sshd[367479]: Failed password for root from 123.108.35.186 port 48326 ssh2
Aug  1 07:08:53 vps-51d81928 sshd[367516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.35.186  user=root
Aug  1 07:08:56 vps-51d81928 sshd[367516]: Failed password for root from 123.108.35.186 port 50122 ssh2
Aug  1 07:10:57 vps-51d81928 sshd[367538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.35.186  user=root
Aug  1 07:11:00 vps-51d81928 sshd[367538]: Failed password for root from 123.108.35.186 port 51700 ssh2
...
2020-08-01 15:11:29
152.136.133.70 attackbotsspam
Invalid user ybli from 152.136.133.70 port 60536
2020-08-01 15:31:24
107.187.122.10 attack
Unauthorized connection attempt detected from IP address 107.187.122.10 to port 22
2020-08-01 15:02:26
188.131.178.32 attackspambots
Invalid user tangxianfeng from 188.131.178.32 port 60978
2020-08-01 15:12:53

Recently Reported IPs

255.168.174.7 201.147.176.235 123.122.182.205 104.210.76.67
35.3.173.237 115.124.152.16 235.182.226.186 232.45.87.250
13.244.191.102 12.66.55.108 151.20.29.102 46.206.216.122
126.137.147.216 91.207.209.193 62.181.124.83 55.143.29.71
52.164.177.238 167.241.173.113 141.26.112.223 81.236.33.54