Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.197.146.75 attack
Scan port
2023-10-18 12:53:52
138.197.146.75 attack
Scan port
2023-09-23 19:49:04
138.197.146.75 attack
Scan port
2023-07-27 12:45:30
138.197.146.75 attack
port scan
2023-02-03 13:47:17
138.197.146.75 attack
Port scan
2022-12-23 13:51:21
138.197.15.190 attackspam
Oct 13 03:50:07 l03 sshd[13578]: Invalid user appserver from 138.197.15.190 port 42290
...
2020-10-13 13:20:21
138.197.15.190 attackbotsspam
SSH Invalid Login
2020-10-13 06:05:42
138.197.152.148 attackbotsspam
Port Scan
...
2020-10-12 07:08:45
138.197.152.148 attackbots
TCP port : 31881
2020-10-11 23:19:23
138.197.152.148 attackspam
firewall-block, port(s): 10363/tcp
2020-10-11 15:17:56
138.197.152.148 attackspam
firewall-block, port(s): 31881/tcp
2020-10-11 08:38:04
138.197.189.231 attackbotsspam
*Port Scan* detected from 138.197.189.231 (DE/Germany/Hesse/Frankfurt am Main/-). 4 hits in the last 235 seconds
2020-10-08 05:34:44
138.197.189.231 attack
 TCP (SYN) 138.197.189.231:48110 -> port 5900, len 48
2020-10-07 13:47:56
138.197.151.213 attackbotsspam
firewall-block, port(s): 32001/tcp
2020-10-06 02:18:47
138.197.151.213 attackspambots
2020-10-05T09:48:33.794878Z 21ac2d9b3602 New connection: 138.197.151.213:47922 (172.17.0.5:2222) [session: 21ac2d9b3602]
2020-10-05T09:58:13.105810Z 46a5d45c28c1 New connection: 138.197.151.213:33728 (172.17.0.5:2222) [session: 46a5d45c28c1]
2020-10-05 18:07:09
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.197.1.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27714
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.197.1.121.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:33:27 CST 2022
;; MSG SIZE  rcvd: 106
Host info
121.1.197.138.in-addr.arpa domain name pointer mrfent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.1.197.138.in-addr.arpa	name = mrfent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
75.130.124.90 attackbotsspam
$f2bV_matches
2020-07-17 02:05:52
167.172.220.247 attack
IP 167.172.220.247 attacked honeypot on port: 5900 at 7/16/2020 9:58:23 AM
2020-07-17 02:24:04
183.88.124.183 attackspam
Unauthorized connection attempt from IP address 183.88.124.183 on Port 445(SMB)
2020-07-17 02:30:35
111.253.62.32 attack
1594907158 - 07/16/2020 15:45:58 Host: 111.253.62.32/111.253.62.32 Port: 445 TCP Blocked
2020-07-17 02:32:22
40.88.138.25 attackbots
Jul 16 15:46:35 pve1 sshd[16097]: Failed password for root from 40.88.138.25 port 23427 ssh2
...
2020-07-17 02:15:17
186.4.156.9 attackspambots
Unauthorised access (Jul 16) SRC=186.4.156.9 LEN=40 TTL=237 ID=6466 TCP DPT=445 WINDOW=1024 SYN
2020-07-17 02:02:14
176.31.120.170 attackspambots
Jul 16 19:46:03 buvik sshd[10968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.120.170
Jul 16 19:46:05 buvik sshd[10968]: Failed password for invalid user broker from 176.31.120.170 port 50896 ssh2
Jul 16 19:53:23 buvik sshd[11888]: Invalid user xxx from 176.31.120.170
...
2020-07-17 02:08:54
140.143.200.251 attack
$f2bV_matches
2020-07-17 02:21:56
61.140.74.171 attack
Jul 16 15:45:54 rancher-0 sshd[376440]: Failed password for root from 61.140.74.171 port 13236 ssh2
Jul 16 15:45:58 rancher-0 sshd[376444]: Invalid user boost from 61.140.74.171 port 9437
...
2020-07-17 02:33:52
208.94.176.5 attackbotsspam
Unauthorized connection attempt from IP address 208.94.176.5 on Port 445(SMB)
2020-07-17 02:23:49
106.206.67.153 attackbotsspam
Unauthorised access (Jul 16) SRC=106.206.67.153 LEN=52 TOS=0x08 PREC=0x60 TTL=110 ID=13598 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-17 02:19:36
106.12.148.74 attackbots
Jul 16 18:46:07 gw1 sshd[6033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.148.74
Jul 16 18:46:08 gw1 sshd[6033]: Failed password for invalid user serverpilot from 106.12.148.74 port 41760 ssh2
...
2020-07-17 02:11:58
114.40.243.60 attackspam
Attempted connection to port 5555.
2020-07-17 02:28:08
165.227.32.232 attackbots
Invalid user u1 from 165.227.32.232 port 41722
2020-07-17 02:41:35
192.42.116.28 attackbots
20 attempts against mh-misbehave-ban on train
2020-07-17 02:03:09

Recently Reported IPs

138.197.1.125 138.197.1.10 138.197.1.132 138.197.1.175
138.197.1.230 138.197.10.18 138.197.10.223 118.175.171.223
138.197.10.240 138.197.10.243 138.197.10.255 138.197.10.31
138.197.10.34 138.197.10.78 138.197.100.116 138.197.10.6
118.175.171.224 138.197.100.127 138.197.100.169 138.197.100.25