Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.201.158.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44763
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.201.158.240.		IN	A

;; AUTHORITY SECTION:
.			339	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:37:23 CST 2022
;; MSG SIZE  rcvd: 108
Host info
240.158.201.138.in-addr.arpa domain name pointer static.240.158.201.138.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
240.158.201.138.in-addr.arpa	name = static.240.158.201.138.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.176.27.6 attack
Feb  1 00:40:10 debian-2gb-nbg1-2 kernel: \[2773269.101183\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.6 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=12706 PROTO=TCP SPT=45132 DPT=4945 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-01 07:54:58
5.39.82.197 attackbots
Jan 31 23:21:27 game-panel sshd[25379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.82.197
Jan 31 23:21:29 game-panel sshd[25379]: Failed password for invalid user user2 from 5.39.82.197 port 50472 ssh2
Jan 31 23:24:27 game-panel sshd[25477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.82.197
2020-02-01 07:54:19
116.88.127.2 attackspam
5555/tcp
[2020-01-31]1pkt
2020-02-01 08:16:56
182.161.177.95 attackspambots
5555/tcp
[2020-01-31]1pkt
2020-02-01 07:42:24
193.188.22.229 attackspambots
Invalid user ts3 from 193.188.22.229 port 27048
2020-02-01 07:58:56
192.241.228.9 attackspam
445/tcp
[2020-01-31]1pkt
2020-02-01 08:15:17
218.92.0.208 attackbots
Feb  1 00:54:14 eventyay sshd[24998]: Failed password for root from 218.92.0.208 port 46263 ssh2
Feb  1 00:54:16 eventyay sshd[24998]: Failed password for root from 218.92.0.208 port 46263 ssh2
Feb  1 00:54:19 eventyay sshd[24998]: Failed password for root from 218.92.0.208 port 46263 ssh2
...
2020-02-01 08:07:20
114.67.229.245 attackbotsspam
Invalid user sayed from 114.67.229.245 port 50260
2020-02-01 08:10:07
222.186.42.155 attack
Feb  1 00:50:48 mail sshd\[31063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Feb  1 00:50:49 mail sshd\[31063\]: Failed password for root from 222.186.42.155 port 24994 ssh2
Feb  1 00:59:27 mail sshd\[31680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
...
2020-02-01 08:09:12
189.212.98.20 attackspam
Automatic report - Port Scan Attack
2020-02-01 07:57:11
191.243.225.197 attack
Telnet/23 MH Probe, BF, Hack -
2020-02-01 08:03:06
222.186.175.140 attackbotsspam
Failed password for root from 222.186.175.140 port 29338 ssh2
Failed password for root from 222.186.175.140 port 29338 ssh2
Failed password for root from 222.186.175.140 port 29338 ssh2
Failed password for root from 222.186.175.140 port 29338 ssh2
2020-02-01 07:46:41
115.178.101.165 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-02-01 08:19:54
81.4.123.26 attackbotsspam
Unauthorized connection attempt detected from IP address 81.4.123.26 to port 2220 [J]
2020-02-01 08:14:32
36.232.252.216 attackspambots
23/tcp
[2020-01-31]1pkt
2020-02-01 08:09:43

Recently Reported IPs

138.201.158.239 138.201.159.97 138.201.159.242 138.201.16.110
138.201.16.233 138.201.16.133 138.201.16.222 138.201.160.170
138.201.161.149 138.201.161.42 118.175.175.252 138.201.161.45
138.201.161.66 138.201.161.70 10.130.56.21 138.201.162.163
138.201.163.143 138.201.164.225 138.201.163.84 118.175.175.26