Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.167.244.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55843
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.167.244.207.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 23:16:04 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'Host 207.244.167.138.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 138.167.244.207.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
103.209.7.114 attackbots
Unauthorized connection attempt from IP address 103.209.7.114 on Port 445(SMB)
2019-12-27 07:36:12
122.224.215.102 attackspambots
Dec 27 00:09:53 legacy sshd[32476]: Failed password for root from 122.224.215.102 port 56318 ssh2
Dec 27 00:12:29 legacy sshd[32567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.215.102
Dec 27 00:12:31 legacy sshd[32567]: Failed password for invalid user guest from 122.224.215.102 port 39869 ssh2
...
2019-12-27 07:18:20
92.119.160.52 attackbotsspam
Dec 26 23:03:54 h2177944 kernel: \[596555.220539\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.52 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=33441 PROTO=TCP SPT=42194 DPT=48118 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 26 23:03:54 h2177944 kernel: \[596555.220555\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.52 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=33441 PROTO=TCP SPT=42194 DPT=48118 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 26 23:45:32 h2177944 kernel: \[599053.511351\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.52 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=53362 PROTO=TCP SPT=42194 DPT=64326 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 26 23:45:32 h2177944 kernel: \[599053.511368\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.52 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=53362 PROTO=TCP SPT=42194 DPT=64326 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 26 23:45:44 h2177944 kernel: \[599065.036425\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.52 DST=85.214.117.9
2019-12-27 07:31:35
52.230.61.135 attack
Dec 26 23:45:39 herz-der-gamer sshd[13622]: Invalid user asterixx from 52.230.61.135 port 56436
Dec 26 23:45:39 herz-der-gamer sshd[13622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.230.61.135
Dec 26 23:45:39 herz-der-gamer sshd[13622]: Invalid user asterixx from 52.230.61.135 port 56436
Dec 26 23:45:41 herz-der-gamer sshd[13622]: Failed password for invalid user asterixx from 52.230.61.135 port 56436 ssh2
...
2019-12-27 07:34:28
121.254.105.39 attack
Unauthorized connection attempt from IP address 121.254.105.39 on Port 445(SMB)
2019-12-27 07:35:07
46.229.168.152 attack
Automated report (2019-12-26T22:45:40+00:00). Scraper detected at this address.
2019-12-27 07:35:43
186.89.127.177 attack
Unauthorized connection attempt from IP address 186.89.127.177 on Port 445(SMB)
2019-12-27 07:32:06
84.253.98.49 attack
Unauthorized connection attempt from IP address 84.253.98.49 on Port 445(SMB)
2019-12-27 07:34:01
182.254.146.230 attackbots
Unauthorised access (Dec 27) SRC=182.254.146.230 LEN=40 TTL=239 ID=19660 TCP DPT=1433 WINDOW=1024 SYN
2019-12-27 07:43:58
189.112.228.153 attackspambots
Dec 26 23:36:05 sd-53420 sshd\[29956\]: Invalid user server from 189.112.228.153
Dec 26 23:36:05 sd-53420 sshd\[29956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.228.153
Dec 26 23:36:07 sd-53420 sshd\[29956\]: Failed password for invalid user server from 189.112.228.153 port 57710 ssh2
Dec 26 23:46:01 sd-53420 sshd\[1832\]: User root from 189.112.228.153 not allowed because none of user's groups are listed in AllowGroups
Dec 26 23:46:01 sd-53420 sshd\[1832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.228.153  user=root
...
2019-12-27 07:17:51
77.247.110.59 attackspam
RDP Bruteforce
2019-12-27 07:06:06
178.128.255.8 attack
Dec 26 13:48:29 : SSH login attempts with invalid user
2019-12-27 07:05:38
125.88.36.218 attackbotsspam
Unauthorized connection attempt from IP address 125.88.36.218 on Port 445(SMB)
2019-12-27 07:22:38
106.13.3.214 attackbots
2019-12-27T00:01:55.595936stark.klein-stark.info sshd\[10623\]: Invalid user raffanti from 106.13.3.214 port 60238
2019-12-27T00:01:55.605013stark.klein-stark.info sshd\[10623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.3.214
2019-12-27T00:01:57.406273stark.klein-stark.info sshd\[10623\]: Failed password for invalid user raffanti from 106.13.3.214 port 60238 ssh2
...
2019-12-27 07:43:19
198.211.120.59 attackbots
12/27/2019-00:21:49.011933 198.211.120.59 Protocol: 17 ET INFO Session Traversal Utilities for NAT (STUN Binding Response)
2019-12-27 07:27:21

Recently Reported IPs

44.164.87.209 88.24.60.38 41.127.41.20 25.177.179.61
19.197.70.148 35.220.5.98 126.26.198.47 11.220.215.40
102.125.184.47 104.113.5.32 90.97.186.152 81.35.158.208
21.0.240.193 29.189.183.203 33.76.16.215 223.98.102.74
220.106.225.62 170.171.111.22 87.7.158.22 136.51.155.136