Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.197.82.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55030
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.197.82.67.			IN	A

;; AUTHORITY SECTION:
.			193	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:35:59 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 67.82.197.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 67.82.197.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.163.246.218 attackbots
Unauthorised access (Oct  6) SRC=222.163.246.218 LEN=40 TTL=49 ID=50316 TCP DPT=8080 WINDOW=36589 SYN
2019-10-06 18:24:14
103.199.69.37 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 06-10-2019 04:45:31.
2019-10-06 18:26:05
37.187.79.117 attack
2019-10-06T05:42:24.710875shield sshd\[28609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.79.117  user=root
2019-10-06T05:42:26.298001shield sshd\[28609\]: Failed password for root from 37.187.79.117 port 50254 ssh2
2019-10-06T05:46:29.840478shield sshd\[29064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.79.117  user=root
2019-10-06T05:46:31.728571shield sshd\[29064\]: Failed password for root from 37.187.79.117 port 41877 ssh2
2019-10-06T05:50:35.132224shield sshd\[29385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.79.117  user=root
2019-10-06 18:23:48
156.203.86.0 attackspambots
Connection by 156.203.86.0 on port: 23 got caught by honeypot at 10/5/2019 8:44:32 PM
2019-10-06 18:56:13
144.217.89.55 attack
Oct  5 20:48:31 wbs sshd\[26955\]: Invalid user Resultat@123 from 144.217.89.55
Oct  5 20:48:31 wbs sshd\[26955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=55.ip-144-217-89.net
Oct  5 20:48:33 wbs sshd\[26955\]: Failed password for invalid user Resultat@123 from 144.217.89.55 port 37524 ssh2
Oct  5 20:52:36 wbs sshd\[27273\]: Invalid user Lyon2017 from 144.217.89.55
Oct  5 20:52:36 wbs sshd\[27273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=55.ip-144-217-89.net
2019-10-06 18:20:59
180.149.231.147 attack
LGS,WP GET /wp-login.php
2019-10-06 18:32:38
222.186.180.19 attackbotsspam
Oct  6 12:14:48 meumeu sshd[2961]: Failed password for root from 222.186.180.19 port 13358 ssh2
Oct  6 12:15:01 meumeu sshd[2961]: Failed password for root from 222.186.180.19 port 13358 ssh2
Oct  6 12:15:05 meumeu sshd[2961]: Failed password for root from 222.186.180.19 port 13358 ssh2
Oct  6 12:15:06 meumeu sshd[2961]: error: maximum authentication attempts exceeded for root from 222.186.180.19 port 13358 ssh2 [preauth]
...
2019-10-06 18:40:23
146.164.21.68 attack
"Fail2Ban detected SSH brute force attempt"
2019-10-06 18:56:54
144.168.61.178 attackspambots
2019-10-06T03:28:50.9247881495-001 sshd\[39697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.168.61.178.16clouds.com  user=root
2019-10-06T03:28:52.8682141495-001 sshd\[39697\]: Failed password for root from 144.168.61.178 port 42504 ssh2
2019-10-06T03:32:11.4733631495-001 sshd\[39939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.168.61.178.16clouds.com  user=root
2019-10-06T03:32:13.3421051495-001 sshd\[39939\]: Failed password for root from 144.168.61.178 port 48886 ssh2
2019-10-06T03:45:13.9684631495-001 sshd\[34992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.168.61.178.16clouds.com  user=root
2019-10-06T03:45:16.1930291495-001 sshd\[34992\]: Failed password for root from 144.168.61.178 port 46182 ssh2
...
2019-10-06 18:33:32
198.100.146.98 attackspambots
Oct  6 11:58:27 lnxweb62 sshd[29498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.100.146.98
2019-10-06 18:54:39
180.100.214.87 attackbots
Oct  6 09:12:33 vps647732 sshd[2873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.100.214.87
Oct  6 09:12:35 vps647732 sshd[2873]: Failed password for invalid user !QAZXSW@ from 180.100.214.87 port 43630 ssh2
...
2019-10-06 18:45:55
190.152.14.178 attack
Oct  6 05:54:04 ny01 sshd[24016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.152.14.178
Oct  6 05:54:06 ny01 sshd[24016]: Failed password for invalid user testuser from 190.152.14.178 port 32854 ssh2
Oct  6 05:59:52 ny01 sshd[25395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.152.14.178
2019-10-06 18:31:19
218.92.0.208 attack
Oct  6 12:40:56 eventyay sshd[5130]: Failed password for root from 218.92.0.208 port 61679 ssh2
Oct  6 12:40:58 eventyay sshd[5130]: Failed password for root from 218.92.0.208 port 61679 ssh2
Oct  6 12:41:00 eventyay sshd[5130]: Failed password for root from 218.92.0.208 port 61679 ssh2
...
2019-10-06 18:43:12
159.203.32.174 attack
Oct  6 10:23:34 web8 sshd\[29611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.32.174  user=root
Oct  6 10:23:36 web8 sshd\[29611\]: Failed password for root from 159.203.32.174 port 45318 ssh2
Oct  6 10:27:47 web8 sshd\[31643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.32.174  user=root
Oct  6 10:27:49 web8 sshd\[31643\]: Failed password for root from 159.203.32.174 port 36751 ssh2
Oct  6 10:32:06 web8 sshd\[1714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.32.174  user=root
2019-10-06 18:47:20
185.153.208.26 attackbots
Oct  6 10:07:19 [host] sshd[17252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.153.208.26  user=root
Oct  6 10:07:22 [host] sshd[17252]: Failed password for root from 185.153.208.26 port 57768 ssh2
Oct  6 10:11:32 [host] sshd[17412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.153.208.26  user=root
2019-10-06 18:55:34

Recently Reported IPs

118.175.175.174 138.197.8.81 138.197.89.66 138.197.82.182
138.197.83.110 138.197.9.113 138.197.9.190 138.197.8.36
138.197.82.219 138.197.94.85 138.197.96.175 118.175.175.176
138.197.92.180 138.197.96.146 138.197.96.196 138.197.96.234
138.197.96.33 138.197.9.29 138.197.96.236 138.197.96.51