Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Landshut

Region: Bavaria

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: Hetzner Online GmbH

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.201.21.124 attackbotsspam
suspicious action Tue, 10 Mar 2020 15:10:37 -0300
2020-03-11 08:23:31
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.201.21.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16485
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.201.21.34.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri May 10 22:09:37 +08 2019
;; MSG SIZE  rcvd: 117

Host info
34.21.201.138.in-addr.arpa domain name pointer static.34.21.201.138.clients.your-server.de.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
34.21.201.138.in-addr.arpa	name = static.34.21.201.138.clients.your-server.de.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
51.77.245.181 attack
k+ssh-bruteforce
2019-12-08 22:58:16
106.54.122.165 attackbotsspam
Dec  8 15:16:00 MK-Soft-VM6 sshd[7414]: Failed password for root from 106.54.122.165 port 34990 ssh2
Dec  8 15:23:11 MK-Soft-VM6 sshd[7469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.122.165 
...
2019-12-08 22:53:28
218.92.0.212 attackspambots
SSH login attempts
2019-12-08 23:17:07
106.12.73.236 attackspam
Dec  8 04:32:03 kapalua sshd\[7876\]: Invalid user choi from 106.12.73.236
Dec  8 04:32:03 kapalua sshd\[7876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.73.236
Dec  8 04:32:05 kapalua sshd\[7876\]: Failed password for invalid user choi from 106.12.73.236 port 52052 ssh2
Dec  8 04:39:52 kapalua sshd\[8853\]: Invalid user pcap from 106.12.73.236
Dec  8 04:39:52 kapalua sshd\[8853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.73.236
2019-12-08 22:45:14
222.186.180.6 attackspam
Dec  8 16:11:55 v22018076622670303 sshd\[12385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6  user=root
Dec  8 16:11:57 v22018076622670303 sshd\[12385\]: Failed password for root from 222.186.180.6 port 11064 ssh2
Dec  8 16:12:01 v22018076622670303 sshd\[12385\]: Failed password for root from 222.186.180.6 port 11064 ssh2
...
2019-12-08 23:13:49
106.12.99.233 attackspambots
Dec  8 14:50:35 h2177944 sshd\[29689\]: Invalid user server from 106.12.99.233 port 19159
Dec  8 14:50:35 h2177944 sshd\[29689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.99.233
Dec  8 14:50:37 h2177944 sshd\[29689\]: Failed password for invalid user server from 106.12.99.233 port 19159 ssh2
Dec  8 14:57:58 h2177944 sshd\[29964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.99.233  user=root
...
2019-12-08 22:38:53
101.51.208.198 attackbots
UTC: 2019-12-07 port: 554/tcp
2019-12-08 22:45:34
1.53.144.8 attackbots
Telnet Server BruteForce Attack
2019-12-08 22:56:44
188.165.211.99 attackspam
Dec  8 04:51:00 kapalua sshd\[10077\]: Invalid user friends from 188.165.211.99
Dec  8 04:51:00 kapalua sshd\[10077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=edtech.com.pk
Dec  8 04:51:01 kapalua sshd\[10077\]: Failed password for invalid user friends from 188.165.211.99 port 48028 ssh2
Dec  8 04:56:29 kapalua sshd\[11177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=edtech.com.pk  user=root
Dec  8 04:56:30 kapalua sshd\[11177\]: Failed password for root from 188.165.211.99 port 57004 ssh2
2019-12-08 23:01:38
217.182.158.104 attack
Dec  8 12:39:25 minden010 sshd[25779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.158.104
Dec  8 12:39:28 minden010 sshd[25779]: Failed password for invalid user bbbbbbb from 217.182.158.104 port 45017 ssh2
Dec  8 12:44:42 minden010 sshd[28976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.158.104
...
2019-12-08 22:39:50
218.10.239.96 attackbotsspam
Dec  8 14:37:08 venus sshd[27800]: Invalid user abdelsalam from 218.10.239.96 port 59440
Dec  8 14:37:08 venus sshd[27800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.10.239.96
Dec  8 14:37:10 venus sshd[27800]: Failed password for invalid user abdelsalam from 218.10.239.96 port 59440 ssh2
Dec  8 14:43:45 venus sshd[28708]: Invalid user uucp from 218.10.239.96 port 58105
Dec  8 14:43:45 venus sshd[28708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.10.239.96
Dec  8 14:43:47 venus sshd[28708]: Failed password for invalid user uucp from 218.10.239.96 port 58105 ssh2
Dec  8 14:50:27 venus sshd[29694]: Invalid user naegele from 218.10.239.96 port 56764
Dec  8 14:50:27 venus sshd[29694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.10.239.96
Dec  8 14:50:30 venus sshd[29694]: Failed password for invalid user naegele from 218.10.239.96........
------------------------------
2019-12-08 22:39:31
183.15.122.19 attackbotsspam
Dec  8 04:53:33 sachi sshd\[8784\]: Invalid user liwana from 183.15.122.19
Dec  8 04:53:33 sachi sshd\[8784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.15.122.19
Dec  8 04:53:34 sachi sshd\[8784\]: Failed password for invalid user liwana from 183.15.122.19 port 52104 ssh2
Dec  8 05:01:51 sachi sshd\[9621\]: Invalid user gia from 183.15.122.19
Dec  8 05:01:51 sachi sshd\[9621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.15.122.19
2019-12-08 23:09:43
61.19.247.121 attackbots
2019-12-08T14:09:01.652293shield sshd\[16245\]: Invalid user user from 61.19.247.121 port 52660
2019-12-08T14:09:01.658027shield sshd\[16245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.19.247.121
2019-12-08T14:09:04.122497shield sshd\[16245\]: Failed password for invalid user user from 61.19.247.121 port 52660 ssh2
2019-12-08T14:15:25.337581shield sshd\[18018\]: Invalid user saure from 61.19.247.121 port 32800
2019-12-08T14:15:25.343134shield sshd\[18018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.19.247.121
2019-12-08 22:46:35
128.199.54.252 attackspambots
2019-12-08T14:41:10.789836shield sshd\[24480\]: Invalid user guest from 128.199.54.252 port 40286
2019-12-08T14:41:10.794848shield sshd\[24480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.54.252
2019-12-08T14:41:13.070636shield sshd\[24480\]: Failed password for invalid user guest from 128.199.54.252 port 40286 ssh2
2019-12-08T14:46:24.815783shield sshd\[25969\]: Invalid user bing from 128.199.54.252 port 48480
2019-12-08T14:46:24.819828shield sshd\[25969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.54.252
2019-12-08 22:55:47
176.236.13.75 attackbotsspam
SSH Brute Force
2019-12-08 22:42:56

Recently Reported IPs

52.36.251.200 78.131.154.241 37.44.237.56 176.2.99.68
151.251.49.27 208.91.255.4 3.25.102.31 201.82.5.116
67.215.224.162 112.212.222.86 189.254.232.61 152.30.5.153
82.20.209.32 191.251.42.35 50.116.39.45 24.162.26.228
208.135.11.69 50.20.0.249 76.171.209.215 70.87.42.213