Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.197.145.163 attackbots
Sent packet to closed port: 10394
2020-08-09 12:36:59
138.197.145.163 attackspambots
17087/tcp 14465/tcp 31783/tcp...
[2020-06-22/08-04]112pkt,43pt.(tcp)
2020-08-05 06:04:02
138.197.145.163 attackspambots
Fail2Ban Ban Triggered
2020-07-28 23:02:10
138.197.145.26 attackspambots
Jul 27 11:20:58 mout sshd[4165]: Invalid user iwan from 138.197.145.26 port 37396
2020-07-27 17:31:36
138.197.145.26 attackbots
firewall-block, port(s): 8113/tcp
2020-07-26 15:25:19
138.197.145.26 attack
Scanned 3 times in the last 24 hours on port 22
2020-07-25 08:36:15
138.197.145.26 attackbots
Jul 24 10:54:47 vpn01 sshd[2993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.145.26
Jul 24 10:54:49 vpn01 sshd[2993]: Failed password for invalid user batal from 138.197.145.26 port 53418 ssh2
...
2020-07-24 17:20:04
138.197.145.26 attackbots
Jul 18 15:58:36 ns382633 sshd\[12725\]: Invalid user sdo from 138.197.145.26 port 41884
Jul 18 15:58:36 ns382633 sshd\[12725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.145.26
Jul 18 15:58:38 ns382633 sshd\[12725\]: Failed password for invalid user sdo from 138.197.145.26 port 41884 ssh2
Jul 18 16:00:58 ns382633 sshd\[13430\]: Invalid user user from 138.197.145.26 port 45014
Jul 18 16:00:58 ns382633 sshd\[13430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.145.26
2020-07-19 02:24:34
138.197.145.26 attack
srv02 Mass scanning activity detected Target: 25369  ..
2020-07-18 13:38:06
138.197.145.26 attackspam
Exploited Host.
2020-07-16 02:26:50
138.197.145.163 attack
firewall-block, port(s): 135/tcp
2020-07-11 22:47:12
138.197.145.26 attackbotsspam
Jul  9 23:55:58 santamaria sshd\[24973\]: Invalid user newsmagazine from 138.197.145.26
Jul  9 23:55:58 santamaria sshd\[24973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.145.26
Jul  9 23:56:00 santamaria sshd\[24973\]: Failed password for invalid user newsmagazine from 138.197.145.26 port 39498 ssh2
...
2020-07-10 06:27:33
138.197.145.26 attackspam
SSH Login Bruteforce
2020-07-09 13:22:45
138.197.145.26 attack
21 attempts against mh-ssh on echoip
2020-07-04 05:12:45
138.197.145.26 attackspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-06-29 00:57:31
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.197.145.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14619
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.197.145.2.			IN	A

;; AUTHORITY SECTION:
.			589	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:34:13 CST 2022
;; MSG SIZE  rcvd: 106
Host info
2.145.197.138.in-addr.arpa domain name pointer primeappliancerepairs.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.145.197.138.in-addr.arpa	name = primeappliancerepairs.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.70.32.148 attackbotsspam
Aug 24 21:02:02 ip-172-31-1-72 sshd\[25912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.32.148  user=ubuntu
Aug 24 21:02:04 ip-172-31-1-72 sshd\[25912\]: Failed password for ubuntu from 193.70.32.148 port 51548 ssh2
Aug 24 21:05:53 ip-172-31-1-72 sshd\[25988\]: Invalid user admin from 193.70.32.148
Aug 24 21:05:53 ip-172-31-1-72 sshd\[25988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.32.148
Aug 24 21:05:55 ip-172-31-1-72 sshd\[25988\]: Failed password for invalid user admin from 193.70.32.148 port 37412 ssh2
2019-08-25 05:24:09
79.7.217.174 attack
Invalid user mailbox from 79.7.217.174 port 62819
2019-08-25 05:29:19
212.83.188.169 attackspam
\[2019-08-24 23:01:11\] NOTICE\[26038\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '212.83.188.169:3662' \(callid: 1140139178-1965748623-522793639\) - Failed to authenticate
\[2019-08-24 23:01:11\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2019-08-24T23:01:11.328+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="\",SessionID="1140139178-1965748623-522793639",LocalAddress="IPV4/UDP/188.40.118.248/5060",RemoteAddress="IPV4/UDP/212.83.188.169/3662",Challenge="1566680471/4376334fc72f2ae58f909e5922a47af9",Response="076ad44328704ca23a9c2041fee2c69d",ExpectedResponse=""
\[2019-08-24 23:01:11\] NOTICE\[3817\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '212.83.188.169:3662' \(callid: 1140139178-1965748623-522793639\) - Failed to authenticate
\[2019-08-24 23:01:11\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResp
2019-08-25 05:16:13
223.220.159.78 attack
2019-08-24T11:18:30.500412abusebot-4.cloudsearch.cf sshd\[3882\]: Invalid user rosario from 223.220.159.78 port 18621
2019-08-25 05:39:45
213.207.33.98 attackbots
NAME : PRIMO_Communications + e-mail abuse : abuse@vivo.al CIDR : 213.207.32.0/22 SYN Flood DDoS Attack AL - block certain countries :) IP: 213.207.33.98  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-08-25 05:09:28
190.104.167.194 attackbots
Aug 24 11:10:24 hiderm sshd\[23567\]: Invalid user terry from 190.104.167.194
Aug 24 11:10:24 hiderm sshd\[23567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.167.194
Aug 24 11:10:25 hiderm sshd\[23567\]: Failed password for invalid user terry from 190.104.167.194 port 19553 ssh2
Aug 24 11:15:50 hiderm sshd\[24018\]: Invalid user grafika from 190.104.167.194
Aug 24 11:15:50 hiderm sshd\[24018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.167.194
2019-08-25 05:27:19
115.238.116.115 attack
Aug 24 16:40:58 eventyay sshd[5342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.116.115
Aug 24 16:41:00 eventyay sshd[5342]: Failed password for invalid user sale from 115.238.116.115 port 27072 ssh2
Aug 24 16:46:57 eventyay sshd[5468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.116.115
...
2019-08-25 05:21:10
114.112.58.134 attackspambots
Invalid user alejandro from 114.112.58.134 port 35902
2019-08-25 04:54:48
43.226.66.35 attackbots
SSH invalid-user multiple login try
2019-08-25 05:10:32
106.51.143.129 attackspam
Aug 24 20:33:27 Ubuntu-1404-trusty-64-minimal sshd\[32313\]: Invalid user irine from 106.51.143.129
Aug 24 20:33:27 Ubuntu-1404-trusty-64-minimal sshd\[32313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.143.129
Aug 24 20:33:30 Ubuntu-1404-trusty-64-minimal sshd\[32313\]: Failed password for invalid user irine from 106.51.143.129 port 34384 ssh2
Aug 24 20:36:56 Ubuntu-1404-trusty-64-minimal sshd\[938\]: Invalid user irine from 106.51.143.129
Aug 24 20:36:56 Ubuntu-1404-trusty-64-minimal sshd\[938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.143.129
2019-08-25 05:19:05
213.21.67.184 attack
Aug 24 11:19:05 MK-Soft-VM3 sshd\[2861\]: Invalid user myl from 213.21.67.184 port 51646
Aug 24 11:19:05 MK-Soft-VM3 sshd\[2861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.21.67.184
Aug 24 11:19:07 MK-Soft-VM3 sshd\[2861\]: Failed password for invalid user myl from 213.21.67.184 port 51646 ssh2
...
2019-08-25 05:17:30
187.122.102.4 attackspam
Aug 24 17:25:13 * sshd[15254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.122.102.4
Aug 24 17:25:14 * sshd[15254]: Failed password for invalid user lakshmi from 187.122.102.4 port 44834 ssh2
2019-08-25 05:05:15
51.75.249.28 attackbots
Aug 24 10:45:23 friendsofhawaii sshd\[22601\]: Invalid user raymond from 51.75.249.28
Aug 24 10:45:23 friendsofhawaii sshd\[22601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=28.ip-51-75-249.eu
Aug 24 10:45:25 friendsofhawaii sshd\[22601\]: Failed password for invalid user raymond from 51.75.249.28 port 41992 ssh2
Aug 24 10:49:07 friendsofhawaii sshd\[22953\]: Invalid user admin from 51.75.249.28
Aug 24 10:49:07 friendsofhawaii sshd\[22953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=28.ip-51-75-249.eu
2019-08-25 04:57:46
104.243.41.97 attackbotsspam
Too many connections or unauthorized access detected from Arctic banned ip
2019-08-25 04:53:15
213.91.181.117 attack
Unauthorized connection attempt from IP address 213.91.181.117 on Port 445(SMB)
2019-08-25 05:23:51

Recently Reported IPs

138.197.145.190 138.197.145.214 138.197.145.222 138.197.145.1
138.197.145.232 138.197.145.66 138.197.146.101 138.197.145.79
138.197.145.77 138.197.146.111 138.197.146.114 118.175.174.88
118.175.174.90 118.175.174.92 138.197.163.79 138.197.163.182
138.197.163.87 138.197.163.225 138.197.163.125 138.197.163.206