Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.197.147.128 attack
Exploited Host.
2020-07-26 03:02:20
138.197.147.128 attackbotsspam
$f2bV_matches
2020-07-04 05:26:08
138.197.147.128 attack
Jun 30 00:42:51 minden010 sshd[29124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.147.128
Jun 30 00:42:54 minden010 sshd[29124]: Failed password for invalid user jv from 138.197.147.128 port 39026 ssh2
Jun 30 00:45:24 minden010 sshd[30763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.147.128
...
2020-06-30 07:24:42
138.197.147.128 attackspam
Jun 23 15:48:26 ns382633 sshd\[14410\]: Invalid user hbase from 138.197.147.128 port 45868
Jun 23 15:48:26 ns382633 sshd\[14410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.147.128
Jun 23 15:48:27 ns382633 sshd\[14410\]: Failed password for invalid user hbase from 138.197.147.128 port 45868 ssh2
Jun 23 15:52:44 ns382633 sshd\[15131\]: Invalid user avorion from 138.197.147.128 port 38896
Jun 23 15:52:44 ns382633 sshd\[15131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.147.128
2020-06-23 21:59:07
138.197.147.128 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-06-21 14:32:41
138.197.147.128 attack
Invalid user oracle from 138.197.147.128 port 59988
2020-06-20 18:02:04
138.197.147.128 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-06-13 12:44:57
138.197.147.128 attackspam
fail2ban -- 138.197.147.128
...
2020-06-11 21:54:31
138.197.147.128 attackspam
Jun  9 23:52:27 mail sshd\[52732\]: Invalid user qqdqz from 138.197.147.128
Jun  9 23:52:27 mail sshd\[52732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.147.128
...
2020-06-10 14:40:56
138.197.147.128 attack
<6 unauthorized SSH connections
2020-05-29 16:13:17
138.197.147.128 attack
May 20 20:11:02 pkdns2 sshd\[62057\]: Invalid user psb from 138.197.147.128May 20 20:11:03 pkdns2 sshd\[62057\]: Failed password for invalid user psb from 138.197.147.128 port 33590 ssh2May 20 20:14:26 pkdns2 sshd\[62190\]: Invalid user dks from 138.197.147.128May 20 20:14:27 pkdns2 sshd\[62190\]: Failed password for invalid user dks from 138.197.147.128 port 40286 ssh2May 20 20:17:44 pkdns2 sshd\[62414\]: Invalid user xiafan from 138.197.147.128May 20 20:17:46 pkdns2 sshd\[62414\]: Failed password for invalid user xiafan from 138.197.147.128 port 46980 ssh2
...
2020-05-21 01:29:56
138.197.147.128 attackspam
2020-05-01T02:29:22.284666linuxbox-skyline sshd[90610]: Invalid user trash from 138.197.147.128 port 58726
...
2020-05-01 17:01:45
138.197.147.128 attack
2020-04-25 11:56:47,000 fail2ban.actions: WARNING [ssh] Ban 138.197.147.128
2020-04-25 19:34:10
138.197.147.128 attackspambots
SASL PLAIN auth failed: ruser=...
2020-04-23 06:46:59
138.197.147.128 attack
Apr 19 13:57:59 legacy sshd[7133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.147.128
Apr 19 13:58:01 legacy sshd[7133]: Failed password for invalid user admin from 138.197.147.128 port 35610 ssh2
Apr 19 14:02:08 legacy sshd[7201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.147.128
...
2020-04-19 23:45:14
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.197.147.223
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32413
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.197.147.223.		IN	A

;; AUTHORITY SECTION:
.			238	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:53:42 CST 2022
;; MSG SIZE  rcvd: 108
Host info
223.147.197.138.in-addr.arpa domain name pointer dot1n2002.servwingu.mx.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
223.147.197.138.in-addr.arpa	name = dot1n2002.servwingu.mx.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
50.7.112.84 attack
Jun 21 07:40:47 srv-4 sshd\[12671\]: Invalid user teamspeak from 50.7.112.84
Jun 21 07:40:47 srv-4 sshd\[12671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.7.112.84
Jun 21 07:40:49 srv-4 sshd\[12671\]: Failed password for invalid user teamspeak from 50.7.112.84 port 37941 ssh2
...
2019-06-21 15:39:38
146.88.240.2 attack
Fri 21 00:19:23 1701/udp
2019-06-21 15:54:28
160.153.147.153 attackspambots
xmlrpc attack
2019-06-21 15:27:51
190.13.106.99 attackbots
Brute force attempt
2019-06-21 15:27:03
118.89.243.245 attack
1433/tcp 7002/tcp 9200/tcp
[2019-06-21]3pkt
2019-06-21 15:56:36
108.163.251.66 attackspambots
Blocking for trying to access an exploit file: /content-post.php
2019-06-21 15:34:44
107.170.238.143 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-06-21 15:52:20
14.191.156.112 attackspambots
Jun 21 07:40:58 srv-4 sshd\[12697\]: Invalid user admin from 14.191.156.112
Jun 21 07:40:58 srv-4 sshd\[12697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.191.156.112
Jun 21 07:41:00 srv-4 sshd\[12697\]: Failed password for invalid user admin from 14.191.156.112 port 55535 ssh2
...
2019-06-21 15:32:05
141.105.99.97 attack
NAME : IBRED CIDR : 141.105.99.0/24 DDoS attack Spain - block certain countries :) IP: 141.105.99.97  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-21 15:40:07
36.84.227.169 attackbotsspam
445/tcp
[2019-06-21]1pkt
2019-06-21 15:33:28
200.93.126.38 attack
445/tcp
[2019-06-21]1pkt
2019-06-21 15:49:48
124.158.4.171 attack
445/tcp
[2019-06-21]1pkt
2019-06-21 15:23:21
103.78.74.252 attack
Portscanning on different or same port(s).
2019-06-21 15:52:39
163.47.146.74 attack
Spam mails sent to address hacked/leaked from Nexus Mods in July 2013
2019-06-21 15:10:38
118.70.131.103 attack
445/tcp
[2019-06-21]1pkt
2019-06-21 15:44:21

Recently Reported IPs

138.197.148.238 138.197.150.244 138.197.150.137 138.197.152.183
138.197.151.8 138.197.158.178 138.197.150.21 138.197.149.119
138.197.159.251 138.197.159.143 138.197.159.8 138.197.161.160
138.197.160.175 138.197.162.157 138.197.163.209 138.197.165.192
138.197.164.93 138.197.165.186 138.197.161.18 138.197.169.52