Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.167.200.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53324
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.167.200.106.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 04:54:15 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'Host 106.200.167.138.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 138.167.200.106.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.8 attackspambots
Sep 15 21:32:05 vps333114 sshd[6709]: Failed password for root from 222.186.180.8 port 56618 ssh2
Sep 15 21:32:08 vps333114 sshd[6709]: Failed password for root from 222.186.180.8 port 56618 ssh2
...
2020-09-16 03:32:01
103.244.121.251 attack
Unauthorized connection attempt from IP address 103.244.121.251 on Port 445(SMB)
2020-09-16 04:01:36
139.162.75.112 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-16 03:51:08
129.152.141.71 attack
Sep 15 21:53:03 lavrea sshd[237255]: Invalid user admin from 129.152.141.71 port 61260
...
2020-09-16 04:02:56
104.244.78.136 attackbots
Sep 15 21:51:57 ourumov-web sshd\[12696\]: Invalid user postgres from 104.244.78.136 port 40336
Sep 15 21:51:57 ourumov-web sshd\[12696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.78.136
Sep 15 21:51:59 ourumov-web sshd\[12696\]: Failed password for invalid user postgres from 104.244.78.136 port 40336 ssh2
...
2020-09-16 03:58:54
103.228.183.10 attack
Sep 15 20:35:19 jane sshd[18175]: Failed password for root from 103.228.183.10 port 53038 ssh2
...
2020-09-16 03:48:17
159.65.12.43 attackbots
Sep 15 20:19:31 ajax sshd[28893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.12.43 
Sep 15 20:19:32 ajax sshd[28893]: Failed password for invalid user ftp from 159.65.12.43 port 60400 ssh2
2020-09-16 03:50:49
187.121.147.60 attack
Sep 14 18:55:51 raspberrypi sshd\[4150\]: Invalid user administrator from 187.121.147.60
...
2020-09-16 03:31:05
196.52.43.124 attack
Fail2Ban Ban Triggered
2020-09-16 03:51:23
78.199.19.89 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-16 03:46:26
157.245.100.226 attackbotsspam
firewall-block, port(s): 7556/tcp
2020-09-16 03:43:27
45.162.4.175 attackspambots
Sep 15 14:44:54 pve1 sshd[32480]: Failed password for root from 45.162.4.175 port 56672 ssh2
...
2020-09-16 03:35:41
27.7.147.214 attackspam
Telnet Server BruteForce Attack
2020-09-16 03:36:41
198.245.50.81 attack
Sep 15 21:37:03 abendstille sshd\[23931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81  user=root
Sep 15 21:37:05 abendstille sshd\[23931\]: Failed password for root from 198.245.50.81 port 42404 ssh2
Sep 15 21:40:31 abendstille sshd\[27229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81  user=root
Sep 15 21:40:34 abendstille sshd\[27229\]: Failed password for root from 198.245.50.81 port 54228 ssh2
Sep 15 21:44:12 abendstille sshd\[30755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81  user=root
...
2020-09-16 03:47:02
43.229.153.76 attackbotsspam
Invalid user kollen from 43.229.153.76 port 56410
2020-09-16 03:42:11

Recently Reported IPs

229.21.230.29 151.179.129.196 174.129.60.167 238.73.155.59
134.92.112.116 69.221.95.74 69.8.85.172 241.226.110.28
23.253.233.76 242.129.197.43 61.200.202.208 99.93.87.77
122.166.135.223 17.76.206.62 169.216.46.50 207.93.41.16
91.25.212.31 120.128.163.189 216.121.46.7 231.41.108.214