Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Zurich

Region: Zurich

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.199.6.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12843
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.199.6.241.			IN	A

;; AUTHORITY SECTION:
.			497	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062200 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 23 00:13:28 CST 2022
;; MSG SIZE  rcvd: 106
Host info
241.6.199.138.in-addr.arpa domain name pointer unn-138-199-6-241.datapacket.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
241.6.199.138.in-addr.arpa	name = unn-138-199-6-241.datapacket.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.24.14.64 attackspambots
Unauthorized connection attempt detected from IP address 118.24.14.64 to port 4605
2020-07-09 04:42:39
49.234.126.177 attack
Jul  8 16:58:40 firewall sshd[8606]: Invalid user ruirongxiang from 49.234.126.177
Jul  8 16:58:42 firewall sshd[8606]: Failed password for invalid user ruirongxiang from 49.234.126.177 port 42030 ssh2
Jul  8 17:02:31 firewall sshd[8739]: Invalid user duke from 49.234.126.177
...
2020-07-09 04:36:55
222.186.180.41 attack
Jul  8 20:24:28 rush sshd[19642]: Failed password for root from 222.186.180.41 port 64780 ssh2
Jul  8 20:24:31 rush sshd[19642]: Failed password for root from 222.186.180.41 port 64780 ssh2
Jul  8 20:24:34 rush sshd[19642]: Failed password for root from 222.186.180.41 port 64780 ssh2
Jul  8 20:24:38 rush sshd[19642]: Failed password for root from 222.186.180.41 port 64780 ssh2
...
2020-07-09 04:24:49
54.185.97.163 attack
Unauthorized connection attempt detected from IP address 54.185.97.163 to port 8443
2020-07-09 04:46:37
189.0.39.101 attack
Unauthorized connection attempt detected from IP address 189.0.39.101 to port 80
2020-07-09 04:54:21
61.246.7.145 attackspambots
2020-07-08T20:12:59.923884shield sshd\[24862\]: Invalid user keiichi from 61.246.7.145 port 57780
2020-07-08T20:12:59.928505shield sshd\[24862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.246.7.145
2020-07-08T20:13:01.532300shield sshd\[24862\]: Failed password for invalid user keiichi from 61.246.7.145 port 57780 ssh2
2020-07-08T20:16:30.823132shield sshd\[25425\]: Invalid user farrin from 61.246.7.145 port 54108
2020-07-08T20:16:30.829433shield sshd\[25425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.246.7.145
2020-07-09 04:26:47
66.249.66.80 attack
Automatic report - Banned IP Access
2020-07-09 04:23:46
218.20.221.168 attackspambots
Unauthorized connection attempt detected from IP address 218.20.221.168 to port 23
2020-07-09 04:48:49
212.47.237.75 attackbots
2020-07-08T20:12:59.964328shield sshd\[24845\]: Invalid user zywu from 212.47.237.75 port 47274
2020-07-08T20:12:59.967464shield sshd\[24845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.237.75
2020-07-08T20:13:01.571244shield sshd\[24845\]: Failed password for invalid user zywu from 212.47.237.75 port 47274 ssh2
2020-07-08T20:16:39.033997shield sshd\[25442\]: Invalid user frappe from 212.47.237.75 port 43834
2020-07-08T20:16:39.038518shield sshd\[25442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.237.75
2020-07-09 04:23:23
116.108.168.23 attack
Unauthorized connection attempt detected from IP address 116.108.168.23 to port 23
2020-07-09 04:43:14
119.28.157.230 attack
Unauthorized connection attempt detected from IP address 119.28.157.230 to port 5051
2020-07-09 04:58:46
222.186.42.137 attackbots
Jul  8 20:20:39 scw-6657dc sshd[5851]: Failed password for root from 222.186.42.137 port 49958 ssh2
Jul  8 20:20:39 scw-6657dc sshd[5851]: Failed password for root from 222.186.42.137 port 49958 ssh2
Jul  8 20:20:41 scw-6657dc sshd[5851]: Failed password for root from 222.186.42.137 port 49958 ssh2
...
2020-07-09 04:22:52
167.172.32.22 attack
Jul  8 20:59:35 rocket sshd[31365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.32.22
Jul  8 20:59:36 rocket sshd[31365]: Failed password for invalid user michaela from 167.172.32.22 port 43480 ssh2
...
2020-07-09 04:33:42
177.71.91.97 attackspam
Unauthorized connection attempt detected from IP address 177.71.91.97 to port 23
2020-07-09 04:41:08
125.129.74.248 attack
Unauthorized connection attempt detected from IP address 125.129.74.248 to port 8080
2020-07-09 04:42:14

Recently Reported IPs

111.206.221.211 137.226.36.80 137.226.33.127 137.226.31.145
149.255.26.228 137.226.32.193 137.226.32.32 137.226.33.16
137.226.36.118 169.229.149.201 137.226.32.71 137.226.16.237
137.226.139.25 137.226.35.222 92.87.185.7 137.226.21.154
169.229.79.247 137.226.28.220 137.226.149.148 169.229.79.219