Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.201.122.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12509
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.201.122.5.			IN	A

;; AUTHORITY SECTION:
.			563	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:27:30 CST 2022
;; MSG SIZE  rcvd: 106
Host info
5.122.201.138.in-addr.arpa domain name pointer hz01.nkhosting.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.122.201.138.in-addr.arpa	name = hz01.nkhosting.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
81.22.45.251 attackbotsspam
Jul 25 07:38:36 h2177944 kernel: \[2357169.874538\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.251 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=6815 PROTO=TCP SPT=57453 DPT=3073 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 25 07:38:43 h2177944 kernel: \[2357176.644060\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.251 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=50237 PROTO=TCP SPT=57453 DPT=3470 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 25 07:41:22 h2177944 kernel: \[2357335.637101\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.251 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=43270 PROTO=TCP SPT=57453 DPT=3194 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 25 07:43:38 h2177944 kernel: \[2357471.731612\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.251 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=21355 PROTO=TCP SPT=57453 DPT=3115 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 25 07:44:17 h2177944 kernel: \[2357510.594304\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.251 DST=85.214.117.9 LEN=4
2019-07-25 14:27:21
77.247.110.212 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-07-25 14:34:52
159.89.163.235 attack
Jul 25 08:38:31 mail sshd\[28667\]: Invalid user benutzer from 159.89.163.235 port 51986
Jul 25 08:38:31 mail sshd\[28667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.163.235
Jul 25 08:38:32 mail sshd\[28667\]: Failed password for invalid user benutzer from 159.89.163.235 port 51986 ssh2
Jul 25 08:43:43 mail sshd\[29511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.163.235  user=openvpn
Jul 25 08:43:45 mail sshd\[29511\]: Failed password for openvpn from 159.89.163.235 port 46886 ssh2
2019-07-25 14:54:05
68.183.29.124 attackbots
Jul 25 08:35:39 mail sshd\[28281\]: Failed password for invalid user view from 68.183.29.124 port 55152 ssh2
Jul 25 08:39:57 mail sshd\[28968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.29.124  user=root
Jul 25 08:39:59 mail sshd\[28968\]: Failed password for root from 68.183.29.124 port 50466 ssh2
Jul 25 08:45:16 mail sshd\[29876\]: Invalid user student from 68.183.29.124 port 45782
Jul 25 08:45:16 mail sshd\[29876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.29.124
2019-07-25 14:54:32
213.132.77.36 attackspam
Unauthorized connection attempt from IP address 213.132.77.36 on Port 445(SMB)
2019-07-25 14:55:28
89.249.247.209 attackspambots
Mail sent to address hacked/leaked from Last.fm
2019-07-25 15:12:01
62.231.7.221 attack
2019-07-25T08:19:30.977925centos sshd\[23220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.231.7.221  user=root
2019-07-25T08:19:32.780018centos sshd\[23220\]: Failed password for root from 62.231.7.221 port 59429 ssh2
2019-07-25T08:19:33.447461centos sshd\[23223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.231.7.221  user=root
2019-07-25 14:23:07
118.99.93.65 attackbots
Unauthorized connection attempt from IP address 118.99.93.65 on Port 445(SMB)
2019-07-25 14:29:38
49.234.79.176 attack
Jul 25 12:07:33 areeb-Workstation sshd\[30628\]: Invalid user network from 49.234.79.176
Jul 25 12:07:33 areeb-Workstation sshd\[30628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.79.176
Jul 25 12:07:35 areeb-Workstation sshd\[30628\]: Failed password for invalid user network from 49.234.79.176 port 37918 ssh2
...
2019-07-25 14:59:04
207.46.13.147 attackbots
Automatic report - Banned IP Access
2019-07-25 14:23:38
200.80.130.106 attackspam
Invalid user test from 200.80.130.106 port 34143
2019-07-25 14:33:10
41.221.251.19 attackspambots
19/7/25@01:16:15: FAIL: Alarm-Intrusion address from=41.221.251.19
...
2019-07-25 14:14:23
81.22.45.134 attackbots
Splunk® : port scan detected:
Jul 25 01:30:32 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:c0:42:d0:39:2c:30:08:00 SRC=81.22.45.134 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=20746 PROTO=TCP SPT=54352 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0
2019-07-25 14:24:08
66.150.128.165 attackspambots
Automatic report - SSH Brute-Force Attack
2019-07-25 14:17:43
54.37.159.12 attack
Jul 25 08:21:22 meumeu sshd[4861]: Failed password for root from 54.37.159.12 port 40786 ssh2
Jul 25 08:25:35 meumeu sshd[28151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.159.12 
Jul 25 08:25:37 meumeu sshd[28151]: Failed password for invalid user cris from 54.37.159.12 port 36238 ssh2
...
2019-07-25 14:38:45

Recently Reported IPs

138.201.122.115 138.201.122.89 138.201.123.202 138.201.125.168
138.201.126.163 138.201.125.99 138.201.126.165 138.201.126.81
138.201.127.24 138.201.127.218 138.201.127.79 138.201.126.39
138.201.127.96 138.201.128.134 138.201.126.35 138.201.128.155
138.201.129.148 138.201.128.174 138.201.129.184 138.201.129.238