Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.196.131.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49127
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.196.131.85.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 12:22:12 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 85.131.196.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 85.131.196.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.74 attackspambots
Sep 27 18:36:02 staging sshd[121463]: Failed password for root from 112.85.42.74 port 34220 ssh2
Sep 27 18:36:06 staging sshd[121463]: Failed password for root from 112.85.42.74 port 34220 ssh2
Sep 27 18:36:59 staging sshd[121471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.74  user=root
Sep 27 18:37:01 staging sshd[121471]: Failed password for root from 112.85.42.74 port 47289 ssh2
...
2020-09-28 02:51:13
94.130.176.206 attackbots
Port probing on unauthorized port 445
2020-09-28 02:42:25
69.55.54.65 attack
2020-09-26 05:19:58 server sshd[32601]: Failed password for invalid user jenkins from 69.55.54.65 port 48734 ssh2
2020-09-28 02:21:53
104.248.169.127 attack
SSHD brute force attack detected from [104.248.169.127]
2020-09-28 02:40:35
41.224.59.78 attackbotsspam
Sep 27 20:05:29 ift sshd\[63478\]: Invalid user user from 41.224.59.78Sep 27 20:05:32 ift sshd\[63478\]: Failed password for invalid user user from 41.224.59.78 port 43332 ssh2Sep 27 20:10:06 ift sshd\[64036\]: Failed password for root from 41.224.59.78 port 49404 ssh2Sep 27 20:14:29 ift sshd\[64644\]: Invalid user julius from 41.224.59.78Sep 27 20:14:31 ift sshd\[64644\]: Failed password for invalid user julius from 41.224.59.78 port 55476 ssh2
...
2020-09-28 02:28:32
223.197.175.91 attackbotsspam
2020-09-27T16:57:09.780608ionos.janbro.de sshd[172919]: Invalid user nvidia from 223.197.175.91 port 39402
2020-09-27T16:57:11.473256ionos.janbro.de sshd[172919]: Failed password for invalid user nvidia from 223.197.175.91 port 39402 ssh2
2020-09-27T17:00:14.922256ionos.janbro.de sshd[172924]: Invalid user minecraft from 223.197.175.91 port 33704
2020-09-27T17:00:14.942573ionos.janbro.de sshd[172924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.175.91
2020-09-27T17:00:14.922256ionos.janbro.de sshd[172924]: Invalid user minecraft from 223.197.175.91 port 33704
2020-09-27T17:00:17.306798ionos.janbro.de sshd[172924]: Failed password for invalid user minecraft from 223.197.175.91 port 33704 ssh2
2020-09-27T17:03:13.698580ionos.janbro.de sshd[172937]: Invalid user wialon from 223.197.175.91 port 56224
2020-09-27T17:03:13.817370ionos.janbro.de sshd[172937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rh
...
2020-09-28 02:31:34
195.29.102.29 attackspam
Sep 27 20:34:57 sip sshd[26159]: Failed password for root from 195.29.102.29 port 55912 ssh2
Sep 27 20:41:19 sip sshd[27898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.29.102.29
Sep 27 20:41:21 sip sshd[27898]: Failed password for invalid user moises from 195.29.102.29 port 38208 ssh2
2020-09-28 02:44:05
167.114.103.140 attackbots
bruteforce detected
2020-09-28 02:22:51
193.247.216.187 attack
1601152464 - 09/26/2020 22:34:24 Host: 193.247.216.187/193.247.216.187 Port: 445 TCP Blocked
2020-09-28 02:54:16
183.16.208.177 attack
 TCP (SYN) 183.16.208.177:37548 -> port 8080, len 40
2020-09-28 02:38:50
45.40.199.82 attack
Sep 27 09:26:15 firewall sshd[7138]: Invalid user test02 from 45.40.199.82
Sep 27 09:26:17 firewall sshd[7138]: Failed password for invalid user test02 from 45.40.199.82 port 49310 ssh2
Sep 27 09:31:36 firewall sshd[7233]: Invalid user teste1 from 45.40.199.82
...
2020-09-28 02:47:01
193.201.214.49 attack
 TCP (SYN) 193.201.214.49:50629 -> port 23, len 44
2020-09-28 02:27:22
117.192.46.40 attackbotsspam
2020-09-27 06:56:15.884117-0500  localhost sshd[50434]: Failed password for invalid user samba from 117.192.46.40 port 35730 ssh2
2020-09-28 02:41:47
154.85.49.31 attackspambots
SSH_attack
2020-09-28 02:21:05
121.139.193.228 attack
Automatic report - Port Scan Attack
2020-09-28 02:52:58

Recently Reported IPs

137.40.148.110 240.197.96.209 231.30.194.239 131.39.88.241
238.169.28.163 71.133.234.5 204.200.31.168 94.139.109.105
255.68.236.218 51.221.90.110 100.18.216.110 49.50.235.186
53.145.76.150 115.220.185.114 207.45.107.159 136.49.93.74
157.97.180.57 23.132.106.169 155.75.155.56 205.95.3.18