Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santa Clara

Region: California

Country: United States

Internet Service Provider: DigitalOcean LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbotsspam
Sep 26 01:04:37 * sshd[30361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.217.164
Sep 26 01:04:39 * sshd[30361]: Failed password for invalid user Guest from 138.197.217.164 port 47290 ssh2
2020-09-26 07:10:05
attackspambots
138.197.217.164 (US/United States/-), 3 distributed sshd attacks on account [ubuntu] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 25 05:11:23 internal2 sshd[11558]: Invalid user ubuntu from 106.51.113.15 port 54010
Sep 25 05:50:40 internal2 sshd[9583]: Invalid user ubuntu from 138.197.217.164 port 58990
Sep 25 06:07:19 internal2 sshd[22834]: Invalid user ubuntu from 119.45.10.225 port 48088

IP Addresses Blocked:

106.51.113.15 (IN/India/broadband.actcorp.in)
2020-09-26 00:19:21
attackspambots
$f2bV_matches
2020-09-25 15:54:53
attackbots
Invalid user admin from 138.197.217.164 port 39348
2020-08-26 17:20:02
attackbotsspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-08-26 02:11:13
attackbotsspam
Invalid user test from 138.197.217.164 port 58564
2020-08-19 06:21:56
attack
2020-08-18T20:43:46.547517ks3355764 sshd[15339]: Invalid user ircbot from 138.197.217.164 port 39414
2020-08-18T20:43:48.449203ks3355764 sshd[15339]: Failed password for invalid user ircbot from 138.197.217.164 port 39414 ssh2
...
2020-08-19 04:11:59
attackbots
Aug 16 17:11:00 hell sshd[26278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.217.164
Aug 16 17:11:02 hell sshd[26278]: Failed password for invalid user kshitiz from 138.197.217.164 port 55890 ssh2
...
2020-08-16 23:58:46
attackspambots
Aug  9 05:28:53 ns382633 sshd\[10394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.217.164  user=root
Aug  9 05:28:55 ns382633 sshd\[10394\]: Failed password for root from 138.197.217.164 port 60172 ssh2
Aug  9 05:42:38 ns382633 sshd\[13246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.217.164  user=root
Aug  9 05:42:40 ns382633 sshd\[13246\]: Failed password for root from 138.197.217.164 port 45484 ssh2
Aug  9 05:46:31 ns382633 sshd\[14067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.217.164  user=root
2020-08-09 19:26:49
attackbotsspam
Jul 17 23:54:33 ns382633 sshd\[21221\]: Invalid user fake from 138.197.217.164 port 50694
Jul 17 23:54:33 ns382633 sshd\[21221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.217.164
Jul 17 23:54:35 ns382633 sshd\[21221\]: Failed password for invalid user fake from 138.197.217.164 port 50694 ssh2
Jul 18 00:03:04 ns382633 sshd\[23022\]: Invalid user oracle from 138.197.217.164 port 55468
Jul 18 00:03:04 ns382633 sshd\[23022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.217.164
2020-07-18 06:50:17
attackbotsspam
Invalid user xuewei from 138.197.217.164 port 45592
2020-07-12 15:50:15
attackbots
Jul 11 22:08:28 vps647732 sshd[17911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.217.164
Jul 11 22:08:30 vps647732 sshd[17911]: Failed password for invalid user Ionut from 138.197.217.164 port 50796 ssh2
...
2020-07-12 04:23:21
attack
$f2bV_matches
2020-07-04 04:49:27
attackspambots
$f2bV_matches
2020-06-27 16:33:52
attackspambots
SSH Invalid Login
2020-06-27 06:51:04
Comments on same subnet:
IP Type Details Datetime
138.197.217.210 spamattack
PHISHING ATTACK
138.197.217.210Richard Wilcox - richardwilcoo@gmail.com - How Are You?, 19 May 2021 08:11:52
NetRange:       138.197.0.0 - 138.197.255.255
NetName:        DIGITALOCEAN-138-197-0-0
2021-05-20 05:08:38
138.197.217.192 attackspam
DATE:2019-07-11 18:10:17, IP:138.197.217.192, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-07-12 04:18:08
138.197.217.192 attack
DATE:2019-07-11 06:59:47, IP:138.197.217.192, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-07-11 13:48:23
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.197.217.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14789
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.197.217.164.		IN	A

;; AUTHORITY SECTION:
.			2041	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062602 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 27 06:51:01 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 164.217.197.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.217.197.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
121.134.159.21 attackbotsspam
Sep 25 01:57:54 v22019038103785759 sshd\[17034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21  user=root
Sep 25 01:57:56 v22019038103785759 sshd\[17034\]: Failed password for root from 121.134.159.21 port 43850 ssh2
Sep 25 02:01:56 v22019038103785759 sshd\[17377\]: Invalid user princess from 121.134.159.21 port 51704
Sep 25 02:01:56 v22019038103785759 sshd\[17377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
Sep 25 02:01:58 v22019038103785759 sshd\[17377\]: Failed password for invalid user princess from 121.134.159.21 port 51704 ssh2
...
2020-09-25 08:50:38
159.89.144.102 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: prod-sfo2.qencode-encoder-9137f07cfe8411eaa27feef0a7ddd79b.
2020-09-25 08:52:45
23.100.34.224 attackspambots
Sep 25 02:44:22 santamaria sshd\[1027\]: Invalid user drmpro from 23.100.34.224
Sep 25 02:44:22 santamaria sshd\[1027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.100.34.224
Sep 25 02:44:23 santamaria sshd\[1027\]: Failed password for invalid user drmpro from 23.100.34.224 port 55897 ssh2
...
2020-09-25 08:56:17
190.128.239.146 attack
SSH Invalid Login
2020-09-25 08:35:53
122.51.95.90 attackbotsspam
$f2bV_matches
2020-09-25 08:54:38
116.255.245.208 attackbots
116.255.245.208 - - [24/Sep/2020:22:33:33 +0100] "POST /wp-login.php HTTP/1.1" 200 2463 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
116.255.245.208 - - [24/Sep/2020:22:33:36 +0100] "POST /wp-login.php HTTP/1.1" 200 2429 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
116.255.245.208 - - [24/Sep/2020:22:33:37 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-25 09:01:04
192.241.239.50 attack
Sep 24 15:52:35 Host-KEWR-E postfix/smtps/smtpd[42000]: lost connection after CONNECT from unknown[192.241.239.50]
...
2020-09-25 09:11:43
197.248.16.118 attackbotsspam
fail2ban -- 197.248.16.118
...
2020-09-25 08:54:01
165.22.77.163 attack
" "
2020-09-25 09:10:30
152.136.101.207 attackspambots
Sep 24 14:11:47 Ubuntu-1404-trusty-64-minimal sshd\[30169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.101.207  user=root
Sep 24 14:11:50 Ubuntu-1404-trusty-64-minimal sshd\[30169\]: Failed password for root from 152.136.101.207 port 51892 ssh2
Sep 25 01:43:29 Ubuntu-1404-trusty-64-minimal sshd\[27702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.101.207  user=root
Sep 25 01:43:30 Ubuntu-1404-trusty-64-minimal sshd\[27702\]: Failed password for root from 152.136.101.207 port 51132 ssh2
Sep 25 02:27:01 Ubuntu-1404-trusty-64-minimal sshd\[20532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.101.207  user=root
2020-09-25 08:59:38
222.186.42.57 attackspambots
Sep 25 02:58:25 abendstille sshd\[5625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.57  user=root
Sep 25 02:58:27 abendstille sshd\[5625\]: Failed password for root from 222.186.42.57 port 26566 ssh2
Sep 25 02:58:30 abendstille sshd\[5625\]: Failed password for root from 222.186.42.57 port 26566 ssh2
Sep 25 02:58:32 abendstille sshd\[5625\]: Failed password for root from 222.186.42.57 port 26566 ssh2
Sep 25 02:58:34 abendstille sshd\[5718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.57  user=root
...
2020-09-25 09:02:44
129.204.82.4 attackspam
SSH Invalid Login
2020-09-25 08:35:33
106.12.196.118 attackspam
SSH / Telnet Brute Force Attempts on Honeypot
2020-09-25 08:31:28
27.7.183.103 attackbots
Port probing on unauthorized port 2323
2020-09-25 08:49:01
52.224.67.47 attack
Sep 24 21:38:01 vps46666688 sshd[31842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.224.67.47
Sep 24 21:38:03 vps46666688 sshd[31842]: Failed password for invalid user infomedia from 52.224.67.47 port 40527 ssh2
...
2020-09-25 08:54:58

Recently Reported IPs

122.241.135.96 131.150.100.46 51.89.232.183 177.105.136.190
98.171.167.69 223.212.163.99 14.160.135.45 108.20.24.16
186.107.172.46 32.229.18.7 187.33.215.205 202.210.250.209
36.208.176.94 76.28.146.188 5.64.228.31 177.134.209.164
67.197.250.76 181.73.0.44 121.147.80.9 98.226.26.41