Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.197.104.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17166
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.197.104.222.		IN	A

;; AUTHORITY SECTION:
.			247	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 138 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:53:33 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 222.104.197.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 222.104.197.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.211.94.250 attackbots
Sep 19 21:28:36 meumeu sshd[7316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.211.94.250 
Sep 19 21:28:38 meumeu sshd[7316]: Failed password for invalid user teamspeak from 117.211.94.250 port 56764 ssh2
Sep 19 21:34:00 meumeu sshd[8012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.211.94.250 
...
2019-09-20 04:58:18
164.132.81.106 attackbots
Sep 19 21:33:47 pornomens sshd\[10790\]: Invalid user test from 164.132.81.106 port 34806
Sep 19 21:33:47 pornomens sshd\[10790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.81.106
Sep 19 21:33:49 pornomens sshd\[10790\]: Failed password for invalid user test from 164.132.81.106 port 34806 ssh2
...
2019-09-20 05:05:25
67.198.128.26 attackspambots
Sep 19 20:52:14 m2 sshd[13405]: Invalid user caja2 from 67.198.128.26
Sep 19 20:52:16 m2 sshd[13405]: Failed password for invalid user caja2 from 67.198.128.26 port 40748 ssh2
Sep 19 21:11:31 m2 sshd[21508]: Invalid user thostname0nich from 67.198.128.26


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=67.198.128.26
2019-09-20 04:50:25
51.254.165.68 attackbotsspam
Port Scan: TCP/22
2019-09-20 05:19:37
62.234.114.148 attackspambots
Sep 19 22:20:24 mail sshd\[31417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.114.148
Sep 19 22:20:25 mail sshd\[31417\]: Failed password for invalid user arthur from 62.234.114.148 port 39358 ssh2
Sep 19 22:20:35 mail sshd\[31440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.114.148  user=root
Sep 19 22:20:37 mail sshd\[31440\]: Failed password for root from 62.234.114.148 port 40432 ssh2
Sep 19 22:26:32 mail sshd\[32467\]: Invalid user kelly from 62.234.114.148 port 41228
2019-09-20 05:01:26
178.159.36.150 attack
SPAM Delivery Attempt
2019-09-20 04:52:07
159.65.126.166 attackbotsspam
Sep 19 21:13:14 HOSTNAME sshd[3960]: Address 159.65.126.166 maps to 170582.cloudwaysapps.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Sep 19 21:13:14 HOSTNAME sshd[3960]: Invalid user wyf from 159.65.126.166 port 55585
Sep 19 21:13:14 HOSTNAME sshd[3960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.126.166


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=159.65.126.166
2019-09-20 05:06:12
193.70.36.161 attackspambots
Sep 19 20:59:33 hcbbdb sshd\[13085\]: Invalid user admin1 from 193.70.36.161
Sep 19 20:59:33 hcbbdb sshd\[13085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.ip-193-70-36.eu
Sep 19 20:59:34 hcbbdb sshd\[13085\]: Failed password for invalid user admin1 from 193.70.36.161 port 43121 ssh2
Sep 19 21:04:05 hcbbdb sshd\[13619\]: Invalid user admin from 193.70.36.161
Sep 19 21:04:05 hcbbdb sshd\[13619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.ip-193-70-36.eu
2019-09-20 05:18:09
162.241.132.130 attack
Sep 19 16:38:05 ny01 sshd[28542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.132.130
Sep 19 16:38:07 ny01 sshd[28542]: Failed password for invalid user silas from 162.241.132.130 port 53432 ssh2
Sep 19 16:42:21 ny01 sshd[29352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.132.130
2019-09-20 04:48:18
162.247.74.213 attackspam
Sep 19 21:33:48 cvbmail sshd\[4010\]: Invalid user 888888 from 162.247.74.213
Sep 19 21:33:48 cvbmail sshd\[4010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.213
Sep 19 21:33:50 cvbmail sshd\[4010\]: Failed password for invalid user 888888 from 162.247.74.213 port 41964 ssh2
2019-09-20 05:05:47
106.13.201.142 attackbots
Sep 19 22:47:24 srv206 sshd[24527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.201.142  user=root
Sep 19 22:47:26 srv206 sshd[24527]: Failed password for root from 106.13.201.142 port 59140 ssh2
...
2019-09-20 04:53:50
27.72.47.240 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 19-09-2019 20:33:22.
2019-09-20 05:21:22
223.171.46.146 attackbotsspam
2019-09-19T23:51:31.247613tmaserv sshd\[18353\]: Failed password for invalid user qf from 223.171.46.146 port 57714 ssh2
2019-09-20T00:04:39.585252tmaserv sshd\[19013\]: Invalid user 123456 from 223.171.46.146 port 57714
2019-09-20T00:04:39.590550tmaserv sshd\[19013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.46.146
2019-09-20T00:04:41.049767tmaserv sshd\[19013\]: Failed password for invalid user 123456 from 223.171.46.146 port 57714 ssh2
2019-09-20T00:08:57.817253tmaserv sshd\[19287\]: Invalid user xr from 223.171.46.146 port 57714
2019-09-20T00:08:57.822566tmaserv sshd\[19287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.46.146
...
2019-09-20 05:22:24
58.254.132.239 attackspambots
Sep 19 22:42:11 MK-Soft-Root1 sshd\[24408\]: Invalid user maint from 58.254.132.239 port 27034
Sep 19 22:42:11 MK-Soft-Root1 sshd\[24408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.239
Sep 19 22:42:14 MK-Soft-Root1 sshd\[24408\]: Failed password for invalid user maint from 58.254.132.239 port 27034 ssh2
...
2019-09-20 05:03:59
167.114.145.139 attack
Sep 19 22:39:47 mail sshd\[2272\]: Failed password for invalid user mailadmin from 167.114.145.139 port 39458 ssh2
Sep 19 22:43:17 mail sshd\[2723\]: Invalid user user4 from 167.114.145.139 port 52220
Sep 19 22:43:17 mail sshd\[2723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.145.139
Sep 19 22:43:19 mail sshd\[2723\]: Failed password for invalid user user4 from 167.114.145.139 port 52220 ssh2
Sep 19 22:46:45 mail sshd\[3139\]: Invalid user m from 167.114.145.139 port 36744
Sep 19 22:46:45 mail sshd\[3139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.145.139
2019-09-20 04:59:54

Recently Reported IPs

138.197.102.129 138.197.101.232 138.197.101.95 138.197.100.204
138.197.107.219 138.197.108.120 138.190.84.94 138.197.106.51
138.197.120.217 138.197.12.115 138.197.129.201 138.197.110.180
138.197.127.127 138.197.124.208 138.197.13.209 138.197.134.120
138.197.131.57 138.197.136.156 138.197.136.27 138.197.132.197