Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Arapora

Region: Minas Gerais

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: Net-blade Comunicações ltda

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.204.199.209 attackspam
Excessive failed login attempts on port 587
2019-07-06 07:34:39
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.204.199.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28238
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.204.199.94.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041600 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 16 17:39:19 +08 2019
;; MSG SIZE  rcvd: 118

Host info
94.199.204.138.in-addr.arpa domain name pointer 138-204-199-94.iubtelecom.net.br.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
94.199.204.138.in-addr.arpa	name = 138-204-199-94.iubtelecom.net.br.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
175.5.153.253 attackspambots
Automatic report - Port Scan Attack
2019-11-29 17:22:50
182.55.181.38 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-29 17:36:07
37.195.50.41 attack
Nov 29 09:35:40 lnxded63 sshd[13355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.195.50.41
2019-11-29 17:13:16
193.112.108.135 attackbotsspam
2019-11-29T10:13:40.907869scmdmz1 sshd\[8103\]: Invalid user server from 193.112.108.135 port 42604
2019-11-29T10:13:40.910433scmdmz1 sshd\[8103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.108.135
2019-11-29T10:13:42.978014scmdmz1 sshd\[8103\]: Failed password for invalid user server from 193.112.108.135 port 42604 ssh2
...
2019-11-29 17:14:04
193.148.68.120 attackspam
WordPress login Brute force / Web App Attack on client site.
2019-11-29 17:18:25
92.118.37.83 attackbots
11/29/2019-03:39:30.573383 92.118.37.83 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-29 17:23:46
200.216.63.46 attackbots
2019-11-29T06:53:18.620531shield sshd\[23621\]: Invalid user wcec from 200.216.63.46 port 36198
2019-11-29T06:53:18.624828shield sshd\[23621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.216.63.46
2019-11-29T06:53:20.833789shield sshd\[23621\]: Failed password for invalid user wcec from 200.216.63.46 port 36198 ssh2
2019-11-29T06:57:25.211772shield sshd\[24792\]: Invalid user backup from 200.216.63.46 port 44056
2019-11-29T06:57:25.215876shield sshd\[24792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.216.63.46
2019-11-29 17:45:59
45.143.220.85 attack
29.11.2019 06:32:21 Connection to port 5060 blocked by firewall
2019-11-29 17:45:35
174.232.9.162 attack
Chat Spam
2019-11-29 17:17:07
52.213.161.3 attackspambots
RDP Bruteforce
2019-11-29 17:37:18
142.93.47.125 attackbots
Nov 29 03:26:15 vps46666688 sshd[21986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.47.125
Nov 29 03:26:18 vps46666688 sshd[21986]: Failed password for invalid user web from 142.93.47.125 port 59198 ssh2
...
2019-11-29 17:10:30
114.67.68.30 attackbots
invalid user
2019-11-29 17:45:24
142.93.46.172 attackbotsspam
fail2ban honeypot
2019-11-29 17:41:31
222.252.30.95 attackspam
Brute forcing RDP port 3389
2019-11-29 17:28:36
222.82.250.4 attackbots
Nov 29 10:16:22 vps691689 sshd[28629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.82.250.4
Nov 29 10:16:24 vps691689 sshd[28629]: Failed password for invalid user hong from 222.82.250.4 port 42700 ssh2
...
2019-11-29 17:34:58

Recently Reported IPs

113.172.231.107 182.120.202.136 107.173.231.46 125.214.57.81
181.67.195.189 37.239.186.211 1.179.137.10 219.78.78.223
187.74.78.200 85.90.166.35 74.6.135.40 219.99.173.220
122.114.218.240 43.230.196.73 95.49.70.135 75.59.238.88
213.230.76.223 218.255.135.34 95.92.249.232 178.33.17.149