Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.193.125.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2633
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.193.125.64.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 20:46:11 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 64.125.193.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.125.193.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.121.211.59 attack
Jun 12 13:47:56 ws22vmsma01 sshd[90862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.59
Jun 12 13:47:58 ws22vmsma01 sshd[90862]: Failed password for invalid user tomcat from 91.121.211.59 port 53116 ssh2
...
2020-06-13 01:28:54
88.208.194.117 attack
Jun 12 19:18:54 cosmoit sshd[4452]: Failed password for root from 88.208.194.117 port 56026 ssh2
2020-06-13 01:38:20
89.90.209.252 attack
Jun 12 16:48:29 vps1 sshd[825666]: Failed password for root from 89.90.209.252 port 47624 ssh2
Jun 12 16:51:50 vps1 sshd[826477]: Invalid user musicbot from 89.90.209.252 port 49104
...
2020-06-13 01:29:11
159.203.30.50 attackspam
firewall-block, port(s): 27847/tcp
2020-06-13 01:34:53
222.186.190.2 attack
2020-06-12T13:35:03.568018xentho-1 sshd[217596]: Failed password for root from 222.186.190.2 port 24240 ssh2
2020-06-12T13:34:57.289809xentho-1 sshd[217596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
2020-06-12T13:34:59.587977xentho-1 sshd[217596]: Failed password for root from 222.186.190.2 port 24240 ssh2
2020-06-12T13:35:03.568018xentho-1 sshd[217596]: Failed password for root from 222.186.190.2 port 24240 ssh2
2020-06-12T13:35:08.008687xentho-1 sshd[217596]: Failed password for root from 222.186.190.2 port 24240 ssh2
2020-06-12T13:34:57.289809xentho-1 sshd[217596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
2020-06-12T13:34:59.587977xentho-1 sshd[217596]: Failed password for root from 222.186.190.2 port 24240 ssh2
2020-06-12T13:35:03.568018xentho-1 sshd[217596]: Failed password for root from 222.186.190.2 port 24240 ssh2
2020-06-12T13:35:08.00
...
2020-06-13 01:45:40
159.89.194.103 attack
Jun 12 14:09:24 vps46666688 sshd[1623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.103
Jun 12 14:09:26 vps46666688 sshd[1623]: Failed password for invalid user admin from 159.89.194.103 port 53444 ssh2
...
2020-06-13 01:25:12
118.24.8.99 attackspambots
Jun 12 19:36:49 cosmoit sshd[5804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.8.99
2020-06-13 01:48:04
188.246.224.140 attack
Jun 12 13:49:53 ws22vmsma01 sshd[91721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.246.224.140
Jun 12 13:49:55 ws22vmsma01 sshd[91721]: Failed password for invalid user zhouyixuan from 188.246.224.140 port 46980 ssh2
...
2020-06-13 01:13:18
87.246.7.70 attackspambots
Jun 12 19:11:44 relay postfix/smtpd\[12720\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 19:12:01 relay postfix/smtpd\[9019\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 19:12:36 relay postfix/smtpd\[9897\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 19:12:57 relay postfix/smtpd\[9041\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 19:13:31 relay postfix/smtpd\[23093\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-13 01:15:55
95.167.39.12 attack
Jun 12 10:27:33 dignus sshd[28355]: Failed password for invalid user matt from 95.167.39.12 port 34666 ssh2
Jun 12 10:30:45 dignus sshd[28668]: Invalid user honey from 95.167.39.12 port 34936
Jun 12 10:30:45 dignus sshd[28668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.39.12
Jun 12 10:30:47 dignus sshd[28668]: Failed password for invalid user honey from 95.167.39.12 port 34936 ssh2
Jun 12 10:34:02 dignus sshd[28953]: Invalid user postgres from 95.167.39.12 port 35204
...
2020-06-13 01:49:10
69.194.8.237 attackbots
Jun 12 16:51:53 scw-6657dc sshd[27928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.194.8.237
Jun 12 16:51:53 scw-6657dc sshd[27928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.194.8.237
Jun 12 16:51:55 scw-6657dc sshd[27928]: Failed password for invalid user beginner from 69.194.8.237 port 44838 ssh2
...
2020-06-13 01:17:57
14.143.107.226 attack
Jun 12 19:31:18 sip sshd[624521]: Invalid user terraria from 14.143.107.226 port 48341
Jun 12 19:31:20 sip sshd[624521]: Failed password for invalid user terraria from 14.143.107.226 port 48341 ssh2
Jun 12 19:38:43 sip sshd[624574]: Invalid user rg from 14.143.107.226 port 46200
...
2020-06-13 01:39:46
106.12.88.95 attackbotsspam
leo_www
2020-06-13 01:14:50
89.248.172.85 attackspam
06/12/2020-13:33:49.789101 89.248.172.85 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-13 01:35:35
183.136.130.104 attack
Jun 12 19:13:35 home sshd[19810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.136.130.104
Jun 12 19:13:37 home sshd[19810]: Failed password for invalid user teamspeak from 183.136.130.104 port 53193 ssh2
Jun 12 19:16:17 home sshd[20155]: Failed password for root from 183.136.130.104 port 39501 ssh2
...
2020-06-13 01:36:42

Recently Reported IPs

150.33.172.36 28.90.57.205 252.132.123.199 104.157.59.114
145.203.96.204 199.152.185.95 8.211.63.97 7.35.107.2
249.131.194.236 219.204.1.62 157.205.19.54 199.100.225.201
65.146.18.54 203.69.187.227 246.171.146.190 68.44.119.151
243.108.252.222 20.8.253.223 177.223.232.105 91.52.110.253