Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.201.140.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50080
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.201.140.221.		IN	A

;; AUTHORITY SECTION:
.			125	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:55:06 CST 2022
;; MSG SIZE  rcvd: 108
Host info
221.140.201.138.in-addr.arpa domain name pointer static.221.140.201.138.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
221.140.201.138.in-addr.arpa	name = static.221.140.201.138.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
154.16.246.84 attackbots
Port 22 (SSH) access denied
2020-04-27 15:54:21
77.37.162.17 attack
Invalid user qf from 77.37.162.17 port 53096
2020-04-27 15:33:02
167.114.3.105 attack
Apr 27 03:55:02 work-partkepr sshd\[13064\]: Invalid user master from 167.114.3.105 port 56922
Apr 27 03:55:02 work-partkepr sshd\[13064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.3.105
...
2020-04-27 15:58:09
178.255.168.249 attackspam
DATE:2020-04-27 05:55:48, IP:178.255.168.249, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-04-27 15:19:16
187.155.200.84 attackspam
Apr 27 06:30:32 work-partkepr sshd\[15366\]: Invalid user mailman from 187.155.200.84 port 39344
Apr 27 06:30:32 work-partkepr sshd\[15366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.155.200.84
...
2020-04-27 15:41:42
221.156.126.1 attackbots
Apr 27 03:04:02 firewall sshd[2166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.156.126.1
Apr 27 03:04:02 firewall sshd[2166]: Invalid user nell from 221.156.126.1
Apr 27 03:04:04 firewall sshd[2166]: Failed password for invalid user nell from 221.156.126.1 port 34288 ssh2
...
2020-04-27 15:37:16
167.99.150.224 attack
Apr 27 05:49:14 sip sshd[12021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.150.224
Apr 27 05:49:16 sip sshd[12021]: Failed password for invalid user gas from 167.99.150.224 port 55892 ssh2
Apr 27 05:55:14 sip sshd[14223]: Failed password for root from 167.99.150.224 port 35182 ssh2
2020-04-27 15:42:56
75.139.131.203 attackspambots
"Unauthorized connection attempt on SSHD detected"
2020-04-27 15:22:00
51.178.83.124 attackbots
Invalid user postgres from 51.178.83.124 port 49360
2020-04-27 15:20:35
113.125.119.250 attackbotsspam
2020-04-27T09:42:23.896921centos sshd[15146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.119.250
2020-04-27T09:42:23.887093centos sshd[15146]: Invalid user robot from 113.125.119.250 port 54076
2020-04-27T09:42:26.018919centos sshd[15146]: Failed password for invalid user robot from 113.125.119.250 port 54076 ssh2
...
2020-04-27 15:54:53
67.207.88.180 attack
4715/tcp 5018/tcp 14594/tcp...
[2020-02-26/04-27]94pkt,33pt.(tcp)
2020-04-27 15:47:13
211.238.147.200 attackbots
Invalid user johan from 211.238.147.200 port 44242
2020-04-27 15:27:54
128.199.85.251 attackspam
Brute force SMTP login attempted.
...
2020-04-27 15:39:02
208.109.14.122 attackbots
web-1 [ssh_2] SSH Attack
2020-04-27 15:26:19
195.154.133.163 attackbots
195.154.133.163 - - [27/Apr/2020:11:36:37 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-04-27 15:43:52

Recently Reported IPs

138.201.148.238 138.201.142.108 138.201.141.220 138.201.141.81
138.201.141.212 138.201.147.88 138.201.149.7 138.201.147.83
138.201.154.86 138.201.16.125 138.201.158.218 138.201.157.180
138.201.154.66 138.201.154.83 138.201.157.227 138.201.159.113
138.201.16.123 138.201.150.210 138.201.152.130 138.201.16.243