Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.197.200.16 attack
Sep 29 22:03:57 ns382633 sshd\[5327\]: Invalid user sybase from 138.197.200.16 port 51536
Sep 29 22:03:57 ns382633 sshd\[5327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.16
Sep 29 22:03:59 ns382633 sshd\[5327\]: Failed password for invalid user sybase from 138.197.200.16 port 51536 ssh2
Sep 29 22:08:59 ns382633 sshd\[6266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.16  user=root
Sep 29 22:09:01 ns382633 sshd\[6266\]: Failed password for root from 138.197.200.16 port 55498 ssh2
2020-09-30 06:45:57
138.197.200.16 attackspambots
Sep 29 16:48:51 OPSO sshd\[3555\]: Invalid user guest from 138.197.200.16 port 45332
Sep 29 16:48:51 OPSO sshd\[3555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.16
Sep 29 16:48:53 OPSO sshd\[3555\]: Failed password for invalid user guest from 138.197.200.16 port 45332 ssh2
Sep 29 16:54:45 OPSO sshd\[4639\]: Invalid user sales from 138.197.200.16 port 60858
Sep 29 16:54:45 OPSO sshd\[4639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.16
2020-09-29 23:01:55
138.197.200.16 attackspambots
2020-09-29T09:50:20.729131lavrinenko.info sshd[1825]: Failed password for root from 138.197.200.16 port 60768 ssh2
2020-09-29T09:54:50.427492lavrinenko.info sshd[2021]: Invalid user snabuser from 138.197.200.16 port 37210
2020-09-29T09:54:50.434426lavrinenko.info sshd[2021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.16
2020-09-29T09:54:50.427492lavrinenko.info sshd[2021]: Invalid user snabuser from 138.197.200.16 port 37210
2020-09-29T09:54:52.575341lavrinenko.info sshd[2021]: Failed password for invalid user snabuser from 138.197.200.16 port 37210 ssh2
...
2020-09-29 15:20:54
138.197.200.113 attack
138.197.200.113 - - \[21/Apr/2020:00:05:56 +0200\] "POST /wp-login.php HTTP/1.1" 200 9652 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
138.197.200.113 - - \[21/Apr/2020:00:05:58 +0200\] "POST /wp-login.php HTTP/1.1" 200 9521 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2020-04-21 07:43:50
138.197.200.113 attackspambots
WordPress login Brute force / Web App Attack on client site.
2020-04-16 00:52:31
138.197.200.65 attackspam
Unauthorized connection attempt detected from IP address 138.197.200.65 to port 5900 [T]
2020-03-24 23:53:05
138.197.200.77 attackbotsspam
Aug 22 11:00:41 dallas01 sshd[27116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.77
Aug 22 11:00:43 dallas01 sshd[27116]: Failed password for invalid user webpop from 138.197.200.77 port 51276 ssh2
Aug 22 11:04:54 dallas01 sshd[27678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.77
2020-01-28 08:10:19
138.197.200.77 attackbots
2019-09-02 19:02:48,010 fail2ban.actions        [804]: NOTICE  [sshd] Ban 138.197.200.77
2019-09-02 22:07:33,199 fail2ban.actions        [804]: NOTICE  [sshd] Ban 138.197.200.77
2019-09-03 01:15:07,054 fail2ban.actions        [804]: NOTICE  [sshd] Ban 138.197.200.77
...
2019-10-03 17:43:57
138.197.200.77 attackbots
Sep 27 15:55:30 eventyay sshd[24532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.77
Sep 27 15:55:32 eventyay sshd[24532]: Failed password for invalid user ubuntu from 138.197.200.77 port 42466 ssh2
Sep 27 16:00:03 eventyay sshd[24633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.77
...
2019-09-27 22:05:15
138.197.200.77 attack
Sep  7 16:38:15 kapalua sshd\[6166\]: Invalid user ubuntu from 138.197.200.77
Sep  7 16:38:15 kapalua sshd\[6166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.77
Sep  7 16:38:17 kapalua sshd\[6166\]: Failed password for invalid user ubuntu from 138.197.200.77 port 48490 ssh2
Sep  7 16:43:01 kapalua sshd\[6705\]: Invalid user ubuntu from 138.197.200.77
Sep  7 16:43:01 kapalua sshd\[6705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.77
2019-09-08 10:54:28
138.197.200.77 attackspambots
$f2bV_matches
2019-09-03 08:57:46
138.197.200.77 attackbots
*Port Scan* detected from 138.197.200.77 (US/United States/-). 4 hits in the last 256 seconds
2019-08-30 10:14:07
138.197.200.77 attack
Aug 13 15:31:58 server sshd\[1579\]: Invalid user iceuser from 138.197.200.77 port 59648
Aug 13 15:31:58 server sshd\[1579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.77
Aug 13 15:32:00 server sshd\[1579\]: Failed password for invalid user iceuser from 138.197.200.77 port 59648 ssh2
Aug 13 15:37:01 server sshd\[23956\]: Invalid user ubnt from 138.197.200.77 port 52412
Aug 13 15:37:01 server sshd\[23956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.77
2019-08-14 00:39:31
138.197.200.77 attackbots
Aug  6 13:26:04 dedicated sshd[23276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.77  user=root
Aug  6 13:26:06 dedicated sshd[23276]: Failed password for root from 138.197.200.77 port 38660 ssh2
2019-08-06 19:40:54
138.197.200.77 attackbotsspam
Aug  4 12:50:59 eventyay sshd[5078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.77
Aug  4 12:51:01 eventyay sshd[5078]: Failed password for invalid user mediax from 138.197.200.77 port 46312 ssh2
Aug  4 12:55:22 eventyay sshd[6294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.77
...
2019-08-04 21:38:56
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.197.200.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41986
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.197.200.216.		IN	A

;; AUTHORITY SECTION:
.			226	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:26:53 CST 2022
;; MSG SIZE  rcvd: 108
Host info
216.200.197.138.in-addr.arpa domain name pointer diser.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
216.200.197.138.in-addr.arpa	name = diser.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.210.16.158 attackbotsspam
Bruteforce detected by fail2ban
2020-06-12 18:30:05
80.78.248.218 attack
Jun 12 12:29:20 master sshd[20389]: Failed password for invalid user melanie from 80.78.248.218 port 41592 ssh2
2020-06-12 18:33:10
138.68.106.62 attack
Invalid user davis from 138.68.106.62 port 50498
2020-06-12 18:15:23
27.128.233.104 attackspam
$f2bV_matches
2020-06-12 18:24:30
183.95.84.34 attackspambots
Jun 12 10:10:29 Ubuntu-1404-trusty-64-minimal sshd\[19691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.95.84.34  user=root
Jun 12 10:10:31 Ubuntu-1404-trusty-64-minimal sshd\[19691\]: Failed password for root from 183.95.84.34 port 42351 ssh2
Jun 12 10:28:05 Ubuntu-1404-trusty-64-minimal sshd\[31526\]: Invalid user ubuntu from 183.95.84.34
Jun 12 10:28:05 Ubuntu-1404-trusty-64-minimal sshd\[31526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.95.84.34
Jun 12 10:28:06 Ubuntu-1404-trusty-64-minimal sshd\[31526\]: Failed password for invalid user ubuntu from 183.95.84.34 port 42993 ssh2
2020-06-12 18:17:36
210.16.88.244 attack
(smtpauth) Failed SMTP AUTH login from 210.16.88.244 (IN/India/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-12 08:20:44 plain authenticator failed for ([210.16.88.244]) [210.16.88.244]: 535 Incorrect authentication data (set_id=marketin@toliddaru.ir)
2020-06-12 18:20:23
107.190.142.218 attackspam
 TCP (SYN) 107.190.142.218:32767 -> port 8545, len 44
2020-06-12 17:57:58
150.136.160.141 attackspambots
Jun 12 10:34:50 sip sshd[621708]: Invalid user admin from 150.136.160.141 port 45942
Jun 12 10:34:52 sip sshd[621708]: Failed password for invalid user admin from 150.136.160.141 port 45942 ssh2
Jun 12 10:38:05 sip sshd[621759]: Invalid user kalina from 150.136.160.141 port 47738
...
2020-06-12 18:00:17
203.0.109.61 attackbots
Icarus honeypot on github
2020-06-12 18:19:45
212.73.68.145 attackspambots
20/6/11@23:51:17: FAIL: Alarm-Intrusion address from=212.73.68.145
...
2020-06-12 17:59:05
5.135.165.55 attack
Jun 12 07:24:07 *** sshd[24224]: Invalid user informix from 5.135.165.55
2020-06-12 18:12:58
179.181.86.136 attack
Automatic report - Port Scan Attack
2020-06-12 18:21:07
210.59.147.127 attack
TW__<177>1591949504 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2]:  {TCP} 210.59.147.127:43785
2020-06-12 17:53:26
200.73.128.252 attackbotsspam
Jun 12 06:01:43 vps sshd[527815]: Failed password for invalid user test from 200.73.128.252 port 36780 ssh2
Jun 12 06:05:14 vps sshd[545177]: Invalid user aguste from 200.73.128.252 port 56870
Jun 12 06:05:14 vps sshd[545177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.128.252
Jun 12 06:05:16 vps sshd[545177]: Failed password for invalid user aguste from 200.73.128.252 port 56870 ssh2
Jun 12 06:08:41 vps sshd[558634]: Invalid user dbadmin from 200.73.128.252 port 48726
...
2020-06-12 17:54:25
147.50.135.171 attackbotsspam
Jun 12 10:08:47 game-panel sshd[18996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.50.135.171
Jun 12 10:08:50 game-panel sshd[18996]: Failed password for invalid user centos from 147.50.135.171 port 51052 ssh2
Jun 12 10:11:41 game-panel sshd[19237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.50.135.171
2020-06-12 18:23:34

Recently Reported IPs

138.197.208.80 138.197.208.96 138.197.203.41 138.197.208.186
138.197.211.200 138.197.211.79 138.197.213.135 138.197.211.43
138.197.213.166 138.197.216.183 138.197.218.145 138.197.217.182
138.197.216.46 138.197.219.235 138.197.220.102 138.197.220.238
138.197.220.92 138.197.217.233 138.197.223.242 138.197.224.47