Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.197.158.232 attackspambots
138.197.158.232 - - [11/Sep/2020:18:52:56 +0200] "HEAD / HTTP/1.1" 405 0 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36"
2020-09-13 00:32:01
138.197.158.232 attackspambots
138.197.158.232 - - [11/Sep/2020:18:52:56 +0200] "HEAD / HTTP/1.1" 405 0 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36"
2020-09-12 16:30:57
138.197.158.118 attackbots
k+ssh-bruteforce
2020-07-24 17:36:41
138.197.158.118 attackspam
SSH Brute-Force reported by Fail2Ban
2020-07-19 16:46:29
138.197.158.118 attack
Invalid user mes from 138.197.158.118 port 52396
2020-07-17 17:16:03
138.197.158.118 attack
Invalid user nelson from 138.197.158.118 port 39166
2020-07-12 06:37:28
138.197.158.118 attackbotsspam
Jul  7 22:58:46 pve1 sshd[616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.158.118 
Jul  7 22:58:48 pve1 sshd[616]: Failed password for invalid user ameet from 138.197.158.118 port 58302 ssh2
...
2020-07-08 07:22:58
138.197.158.118 attackbots
$f2bV_matches
2020-07-04 05:13:09
138.197.158.118 attack
Jul  3 17:37:58 pve1 sshd[22717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.158.118 
Jul  3 17:38:00 pve1 sshd[22717]: Failed password for invalid user xyh from 138.197.158.118 port 42446 ssh2
...
2020-07-04 00:25:21
138.197.158.118 attack
Jun 24 00:24:16 vps647732 sshd[25923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.158.118
Jun 24 00:24:17 vps647732 sshd[25923]: Failed password for invalid user user2 from 138.197.158.118 port 40148 ssh2
...
2020-06-24 07:32:20
138.197.158.118 attackbotsspam
$f2bV_matches
2020-06-21 17:21:59
138.197.158.118 attack
2020-06-09T06:12:15.919056server.espacesoutien.com sshd[22635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.158.118
2020-06-09T06:12:05.911150server.espacesoutien.com sshd[22635]: Invalid user tsinghua from 138.197.158.118 port 59354
2020-06-09T06:12:17.824511server.espacesoutien.com sshd[22635]: Failed password for invalid user tsinghua from 138.197.158.118 port 59354 ssh2
2020-06-09T06:15:22.011658server.espacesoutien.com sshd[23241]: Invalid user om from 138.197.158.118 port 60894
...
2020-06-09 14:18:38
138.197.158.118 attackspambots
Jun  5 15:32:09 odroid64 sshd\[19255\]: User root from 138.197.158.118 not allowed because not listed in AllowUsers
Jun  5 15:32:10 odroid64 sshd\[19255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.158.118  user=root
...
2020-06-06 02:46:50
138.197.158.118 attackspambots
May 19 19:37:33 wbs sshd\[28973\]: Invalid user jpz from 138.197.158.118
May 19 19:37:33 wbs sshd\[28973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.158.118
May 19 19:37:36 wbs sshd\[28973\]: Failed password for invalid user jpz from 138.197.158.118 port 40250 ssh2
May 19 19:39:40 wbs sshd\[29271\]: Invalid user xoh from 138.197.158.118
May 19 19:39:40 wbs sshd\[29271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.158.118
2020-05-20 14:48:46
138.197.158.118 attack
(sshd) Failed SSH login from 138.197.158.118 (CA/Canada/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  9 04:08:18 amsweb01 sshd[17990]: Invalid user uftp from 138.197.158.118 port 35724
May  9 04:08:19 amsweb01 sshd[17990]: Failed password for invalid user uftp from 138.197.158.118 port 35724 ssh2
May  9 04:20:09 amsweb01 sshd[19192]: Invalid user david from 138.197.158.118 port 59054
May  9 04:20:12 amsweb01 sshd[19192]: Failed password for invalid user david from 138.197.158.118 port 59054 ssh2
May  9 04:23:23 amsweb01 sshd[19493]: Invalid user ac from 138.197.158.118 port 33920
2020-05-09 21:07:17
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.197.158.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38156
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.197.158.14.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 03:38:28 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 14.158.197.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.158.197.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.51.85.16 attack
2020-09-23T20:13:44.671060abusebot-4.cloudsearch.cf sshd[11049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.85.16  user=root
2020-09-23T20:13:46.689160abusebot-4.cloudsearch.cf sshd[11049]: Failed password for root from 106.51.85.16 port 55914 ssh2
2020-09-23T20:16:51.017969abusebot-4.cloudsearch.cf sshd[11063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.85.16  user=root
2020-09-23T20:16:52.905413abusebot-4.cloudsearch.cf sshd[11063]: Failed password for root from 106.51.85.16 port 35986 ssh2
2020-09-23T20:17:59.935591abusebot-4.cloudsearch.cf sshd[11069]: Invalid user formation from 106.51.85.16 port 51878
2020-09-23T20:17:59.942838abusebot-4.cloudsearch.cf sshd[11069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.85.16
2020-09-23T20:17:59.935591abusebot-4.cloudsearch.cf sshd[11069]: Invalid user formation from 106.51.85.16 port 5187
...
2020-09-24 12:01:13
37.187.252.148 attack
37.187.252.148 - - [24/Sep/2020:01:46:25 +0000] "POST /wp-login.php HTTP/1.1" 200 2075 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
37.187.252.148 - - [24/Sep/2020:01:46:27 +0000] "POST /wp-login.php HTTP/1.1" 200 2052 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
37.187.252.148 - - [24/Sep/2020:01:46:29 +0000] "POST /wp-login.php HTTP/1.1" 200 2049 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
37.187.252.148 - - [24/Sep/2020:01:46:31 +0000] "POST /wp-login.php HTTP/1.1" 200 2049 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
37.187.252.148 - - [24/Sep/2020:01:46:32 +0000] "POST /xmlrpc.php HTTP/1.1" 200 236 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
2020-09-24 12:04:50
106.13.129.8 attack
Fail2Ban Ban Triggered
2020-09-24 12:13:29
219.77.104.197 attack
Sep 23 20:05:45 root sshd[25208]: Invalid user osmc from 219.77.104.197
...
2020-09-24 12:24:31
111.93.172.30 attackbotsspam
Blocked by Sophos UTM Network Protection . /    / proto=6  .  srcport=53839  .  dstport=445  .     (2905)
2020-09-24 12:03:23
189.251.73.140 attack
1600880744 - 09/23/2020 19:05:44 Host: 189.251.73.140/189.251.73.140 Port: 445 TCP Blocked
2020-09-24 12:26:15
222.186.31.166 attackbots
Sep 24 06:30:33 theomazars sshd[24554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
Sep 24 06:30:34 theomazars sshd[24554]: Failed password for root from 222.186.31.166 port 52509 ssh2
2020-09-24 12:33:21
104.236.244.98 attackspambots
[ssh] SSH attack
2020-09-24 12:17:21
54.37.71.204 attack
Sep 24 05:29:39 ift sshd\[23978\]: Invalid user xh from 54.37.71.204Sep 24 05:29:41 ift sshd\[23978\]: Failed password for invalid user xh from 54.37.71.204 port 59018 ssh2Sep 24 05:33:35 ift sshd\[24460\]: Invalid user leo from 54.37.71.204Sep 24 05:33:37 ift sshd\[24460\]: Failed password for invalid user leo from 54.37.71.204 port 39834 ssh2Sep 24 05:37:31 ift sshd\[25580\]: Invalid user user1 from 54.37.71.204
...
2020-09-24 12:31:59
149.34.17.76 attackspam
Sep 23 17:05:58 ssh2 sshd[70026]: Invalid user pi from 149.34.17.76 port 53684
Sep 23 17:05:58 ssh2 sshd[70026]: Failed password for invalid user pi from 149.34.17.76 port 53684 ssh2
Sep 23 17:05:58 ssh2 sshd[70026]: Connection closed by invalid user pi 149.34.17.76 port 53684 [preauth]
...
2020-09-24 12:11:43
152.32.166.14 attackbots
2020-09-24T01:44:52.411874snf-827550 sshd[20224]: Invalid user es from 152.32.166.14 port 55328
2020-09-24T01:44:54.992901snf-827550 sshd[20224]: Failed password for invalid user es from 152.32.166.14 port 55328 ssh2
2020-09-24T01:49:21.295162snf-827550 sshd[20276]: Invalid user username from 152.32.166.14 port 36248
...
2020-09-24 12:09:40
187.126.57.202 attackbotsspam
Automatic report - Port Scan Attack
2020-09-24 12:28:26
85.105.93.174 attackspam
Sep 23 20:05:56 root sshd[25295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.105.93.174  user=root
Sep 23 20:05:58 root sshd[25295]: Failed password for root from 85.105.93.174 port 49894 ssh2
...
2020-09-24 12:06:02
123.122.161.242 attack
Triggered by Fail2Ban at Ares web server
2020-09-24 07:55:10
65.92.155.124 attack
Sep 23 20:05:40 root sshd[25163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=toroon4654w-lp130-01-65-92-155-124.dsl.bell.ca  user=root
Sep 23 20:05:42 root sshd[25163]: Failed password for root from 65.92.155.124 port 41964 ssh2
...
2020-09-24 12:28:53

Recently Reported IPs

201.76.253.113 115.57.135.5 117.247.186.90 219.149.193.180
188.248.195.42 45.186.150.13 170.79.181.188 120.85.119.147
213.177.20.6 27.36.151.170 78.40.106.11 85.228.236.124
123.181.73.222 120.193.91.213 45.182.115.120 53.96.37.210
1.10.202.141 120.26.70.88 41.233.120.148 35.198.107.215