Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.197.142.81 attack
Jun 23 09:13:11 [host] sshd[2538]: Invalid user bo
Jun 23 09:13:11 [host] sshd[2538]: pam_unix(sshd:a
Jun 23 09:13:13 [host] sshd[2538]: Failed password
2020-06-23 16:31:43
138.197.142.81 attackbots
2020-06-17T08:22:01.882591shield sshd\[5467\]: Invalid user ty from 138.197.142.81 port 54782
2020-06-17T08:22:01.886360shield sshd\[5467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.142.81
2020-06-17T08:22:03.435877shield sshd\[5467\]: Failed password for invalid user ty from 138.197.142.81 port 54782 ssh2
2020-06-17T08:25:18.426479shield sshd\[5770\]: Invalid user 3 from 138.197.142.81 port 54958
2020-06-17T08:25:18.430407shield sshd\[5770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.142.81
2020-06-17 19:27:14
138.197.142.81 attack
May  5 18:58:27 pi sshd[15316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.142.81 
May  5 18:58:29 pi sshd[15316]: Failed password for invalid user lh from 138.197.142.81 port 59308 ssh2
2020-06-07 03:38:44
138.197.142.81 attack
(sshd) Failed SSH login from 138.197.142.81 (CA/Canada/-): 5 in the last 3600 secs
2020-05-25 03:32:58
138.197.142.81 attack
May 21 23:43:34 eventyay sshd[27112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.142.81
May 21 23:43:37 eventyay sshd[27112]: Failed password for invalid user ziyang from 138.197.142.81 port 35812 ssh2
May 21 23:46:13 eventyay sshd[27253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.142.81
...
2020-05-22 06:00:48
138.197.142.81 attackbots
Invalid user iff from 138.197.142.81 port 46016
2020-05-20 04:14:36
138.197.142.81 attack
May 15 09:04:15 sso sshd[20968]: Failed password for root from 138.197.142.81 port 51588 ssh2
...
2020-05-15 16:23:54
138.197.142.81 attack
May  9 04:43:27 piServer sshd[7387]: Failed password for root from 138.197.142.81 port 52814 ssh2
May  9 04:46:58 piServer sshd[7638]: Failed password for root from 138.197.142.81 port 33662 ssh2
...
2020-05-09 17:17:27
138.197.142.81 attack
Apr 26 23:17:00 electroncash sshd[25532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.142.81 
Apr 26 23:17:00 electroncash sshd[25532]: Invalid user mjs from 138.197.142.81 port 44842
Apr 26 23:17:01 electroncash sshd[25532]: Failed password for invalid user mjs from 138.197.142.81 port 44842 ssh2
Apr 26 23:20:38 electroncash sshd[26569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.142.81  user=root
Apr 26 23:20:41 electroncash sshd[26569]: Failed password for root from 138.197.142.81 port 55164 ssh2
...
2020-04-27 05:27:02
138.197.142.81 attackspambots
Apr 24 04:20:54 firewall sshd[5233]: Failed password for invalid user deploy from 138.197.142.81 port 57692 ssh2
Apr 24 04:25:00 firewall sshd[5331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.142.81  user=root
Apr 24 04:25:02 firewall sshd[5331]: Failed password for root from 138.197.142.81 port 43674 ssh2
...
2020-04-24 16:56:47
138.197.142.181 attackspam
Aug 20 03:40:58 plusreed sshd[14711]: Invalid user legal3 from 138.197.142.181
...
2019-08-20 15:51:38
138.197.142.181 attackspambots
Aug 19 00:40:03 OPSO sshd\[1571\]: Invalid user fei from 138.197.142.181 port 58378
Aug 19 00:40:03 OPSO sshd\[1571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.142.181
Aug 19 00:40:05 OPSO sshd\[1571\]: Failed password for invalid user fei from 138.197.142.181 port 58378 ssh2
Aug 19 00:44:10 OPSO sshd\[1883\]: Invalid user mother from 138.197.142.181 port 47926
Aug 19 00:44:10 OPSO sshd\[1883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.142.181
2019-08-19 06:45:59
138.197.142.181 attackspam
Aug  9 18:54:24 *** sshd[16177]: User root from 138.197.142.181 not allowed because not listed in AllowUsers
2019-08-10 03:43:22
138.197.142.181 attack
Automatic report - Banned IP Access
2019-08-07 21:49:38
138.197.142.181 attack
Aug  3 09:41:23 MK-Soft-Root2 sshd\[8876\]: Invalid user master1 from 138.197.142.181 port 46274
Aug  3 09:41:23 MK-Soft-Root2 sshd\[8876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.142.181
Aug  3 09:41:25 MK-Soft-Root2 sshd\[8876\]: Failed password for invalid user master1 from 138.197.142.181 port 46274 ssh2
...
2019-08-03 18:57:21
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.197.142.206
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12505
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.197.142.206.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:34:10 CST 2022
;; MSG SIZE  rcvd: 108
Host info
206.142.197.138.in-addr.arpa domain name pointer fabnew.wpmudev.host.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
206.142.197.138.in-addr.arpa	name = fabnew.wpmudev.host.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
40.71.174.83 attack
Sep  5 22:53:16 vps647732 sshd[20496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.71.174.83
Sep  5 22:53:18 vps647732 sshd[20496]: Failed password for invalid user vboxuser from 40.71.174.83 port 49078 ssh2
...
2019-09-06 04:59:34
198.98.60.66 attack
fire
2019-09-06 05:03:09
192.144.142.72 attack
Sep  5 23:32:18 taivassalofi sshd[216746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.142.72
Sep  5 23:32:20 taivassalofi sshd[216746]: Failed password for invalid user teste from 192.144.142.72 port 40069 ssh2
...
2019-09-06 04:46:35
209.97.171.242 attack
fire
2019-09-06 04:37:34
198.98.62.146 attackspam
fire
2019-09-06 05:00:52
66.249.65.153 attack
Automatic report - Banned IP Access
2019-09-06 04:27:44
206.189.23.43 attack
fire
2019-09-06 04:50:26
118.24.121.240 attackbotsspam
Sep  5 22:44:26 SilenceServices sshd[27100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.121.240
Sep  5 22:44:27 SilenceServices sshd[27100]: Failed password for invalid user salesboom from 118.24.121.240 port 48837 ssh2
Sep  5 22:46:47 SilenceServices sshd[27963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.121.240
2019-09-06 04:47:06
130.61.83.71 attackspambots
Sep  6 03:17:00 webhost01 sshd[24587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.83.71
Sep  6 03:17:02 webhost01 sshd[24587]: Failed password for invalid user ircbot from 130.61.83.71 port 24665 ssh2
...
2019-09-06 04:41:17
205.185.120.241 attack
fire
2019-09-06 04:56:15
58.87.67.226 attack
Sep  5 10:41:00 hcbb sshd\[31272\]: Invalid user test from 58.87.67.226
Sep  5 10:41:00 hcbb sshd\[31272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.67.226
Sep  5 10:41:02 hcbb sshd\[31272\]: Failed password for invalid user test from 58.87.67.226 port 48530 ssh2
Sep  5 10:45:45 hcbb sshd\[31687\]: Invalid user webdata from 58.87.67.226
Sep  5 10:45:45 hcbb sshd\[31687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.67.226
2019-09-06 05:05:29
153.36.236.35 attackspam
2019-09-05T21:06:29.345693abusebot-8.cloudsearch.cf sshd\[26487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.35  user=root
2019-09-06 05:09:27
118.186.2.18 attackbotsspam
Sep  5 14:06:06 xb0 sshd[29695]: Failed password for invalid user steam from 118.186.2.18 port 36908 ssh2
Sep  5 14:06:06 xb0 sshd[29695]: Received disconnect from 118.186.2.18: 11: Bye Bye [preauth]
Sep  5 14:13:43 xb0 sshd[5898]: Failed password for invalid user ubuntu from 118.186.2.18 port 58705 ssh2
Sep  5 14:13:43 xb0 sshd[5898]: Received disconnect from 118.186.2.18: 11: Bye Bye [preauth]
Sep  5 14:17:39 xb0 sshd[3583]: Failed password for invalid user test from 118.186.2.18 port 43406 ssh2
Sep  5 14:17:39 xb0 sshd[3583]: Received disconnect from 118.186.2.18: 11: Bye Bye [preauth]
Sep  5 14:21:30 xb0 sshd[1528]: Failed password for invalid user *** from 118.186.2.18 port 56342 ssh2
Sep  5 14:21:31 xb0 sshd[1528]: Received disconnect from 118.186.2.18: 11: Bye Bye [preauth]
Sep  5 14:25:13 xb0 sshd[21913]: Failed password for invalid user student from 118.186.2.18 port 41078 ssh2
Sep  5 14:25:13 xb0 sshd[21913]: Received disconnect from 118.186.2.18: 11: Bye Bye ........
-------------------------------
2019-09-06 04:43:26
1.32.250.141 attackbotsspam
firewall-block, port(s): 445/tcp
2019-09-06 04:45:37
106.75.55.123 attackbotsspam
Sep  5 22:10:05 mail sshd\[25449\]: Failed password for invalid user 111111 from 106.75.55.123 port 52156 ssh2
Sep  5 22:13:29 mail sshd\[25827\]: Invalid user password from 106.75.55.123 port 49352
Sep  5 22:13:29 mail sshd\[25827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.55.123
Sep  5 22:13:31 mail sshd\[25827\]: Failed password for invalid user password from 106.75.55.123 port 49352 ssh2
Sep  5 22:16:55 mail sshd\[26186\]: Invalid user live from 106.75.55.123 port 46360
Sep  5 22:16:55 mail sshd\[26186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.55.123
2019-09-06 04:51:23

Recently Reported IPs

138.197.142.172 138.197.142.184 138.197.142.238 138.197.142.219
138.197.142.80 138.197.143.160 138.197.143.247 138.197.143.4
138.197.143.18 138.197.143.34 138.197.144.52 138.197.144.71
138.197.145.103 138.197.145.123 138.197.145.16 138.197.145.190
138.197.145.2 138.197.145.214 138.197.145.222 138.197.145.1